Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-vr85-5pwx-c6gq

Опубликовано: 21 мая 2024
Источник: github
Github: Прошло ревью
CVSS3: 6.1

Описание

OMERO.web must check that the JSONP callback is a valid function

Background

There is currently no escaping or validation of the callback parameter that can be passed to various OMERO.web endpoints that have JSONP enabled. One such endpoint is /webclient/imgData/.... As we only really use these endpoints with jQuery's own callback name generation 1 it is quite difficult or even impossible to exploit this in vanilla OMERO.web. However, these metadata endpoints are likely to be used by many plugins.

Impact

OMERO.web before 5.25.0

Patches

Users should upgrade to 5.26.0 or higher

Workarounds

None

References

For more information If you have any questions or comments about this advisory:

Open an issue in omero-web Email us at security@openmicroscopy.org

Footnotes

  1. https://learn.jquery.com/ajax/working-with-jsonp/

Пакеты

Наименование

omero-web

pip
Затронутые версииВерсия исправления

< 5.26.0

5.26.0

EPSS

Процентиль: 62%
0.00422
Низкий

6.1 Medium

CVSS3

Дефекты

CWE-830

Связанные уязвимости

CVSS3: 6.1
nvd
больше 1 года назад

OMERO.web provides a web based client and plugin infrastructure. There is currently no escaping or validation of the `callback` parameter that can be passed to various OMERO.web endpoints that have JSONP enabled. This vulnerability has been patched in version 5.26.0.

EPSS

Процентиль: 62%
0.00422
Низкий

6.1 Medium

CVSS3

Дефекты

CWE-830