Описание
OMERO.web provides a web based client and plugin infrastructure. In versions prior to 5.11.0, a variety of templates do not perform proper sanitization through HTML escaping. Due to the lack of sanitization and use of jQuery.html(), there are a whole host of cross-site scripting possibilities with specially crafted input to a variety of fields. This issue is patched in version 5.11.0. There are no known workarounds aside from upgrading.
Ссылки
- PatchThird Party Advisory
- Third Party Advisory
- Vendor Advisory
- PatchThird Party Advisory
- Third Party Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 4.4.1 (исключая)Версия до 5.11.0 (исключая)
Одно из
cpe:2.3:a:openmicroscopy:omero-figure:*:*:*:*:*:*:*:*
cpe:2.3:a:openmicroscopy:omero-web:*:*:*:*:*:*:*:*
EPSS
Процентиль: 68%
0.00558
Низкий
9.8 Critical
CVSS3
6.1 Medium
CVSS3
4.3 Medium
CVSS2
Дефекты
CWE-116
CWE-79
Связанные уязвимости
CVSS3: 9.8
github
больше 4 лет назад
Inconsistent input sanitisation leads to XSS vectors
EPSS
Процентиль: 68%
0.00558
Низкий
9.8 Critical
CVSS3
6.1 Medium
CVSS3
4.3 Medium
CVSS2
Дефекты
CWE-116
CWE-79