Описание
OMERO.web exposes some unnecessary session information in the page
Background
OMERO.web loads various information about the current user such as their id, name and the groups they are in, and these are available on the main webclient pages. Some additional information being loaded is not used by the webclient and is being removed in this release.
Impact
OMERO.web before 5.9.0
Patches
5.9.0
Workarounds
No workaround
References
For more information
If you have any questions or comments about this advisory:
Ссылки
- https://github.com/ome/omero-web/security/advisories/GHSA-gfp2-w5jm-955q
- https://nvd.nist.gov/vuln/detail/CVE-2021-21376
- https://github.com/ome/omero-web/commit/952f8e5d28532fbb14fb665982211329d137908c
- https://github.com/ome/omero-web/blob/master/CHANGELOG.md#590-march-2021
- https://github.com/pypa/advisory-database/tree/main/vulns/omero-web/PYSEC-2021-31.yaml
- https://pypi.org/project/omero-web
- https://www.openmicroscopy.org/security/advisories/2021-SV1
Пакеты
omero-web
< 5.9.0
5.9.0
Связанные уязвимости
OMERO.web is open source Django-based software for managing microscopy imaging. OMERO.web before version 5.9.0 loads various information about the current user such as their id, name and the groups they are in, and these are available on the main webclient pages. This represents an information exposure vulnerability. Some additional information being loaded is not used by the webclient and is being removed in this release. This is fixed in version 5.9.0.