CVE-2021-41132
Description
OMERO.web provides a web based client and plugin infrastructure. In versions prior to 5.11.0, a variety of templates do not perform proper sanitization through HTML escaping. Due to the lack of sanitization and use of ``jQuery.html()``, there are a whole host of cross-site scripting possibilities with specially crafted input to a variety of fields. This issue is patched in version 5.11.0. There are no known workarounds aside from upgrading.
References
CvssV3 impact
BaseSeverity | MEDIUM |
ConfidentialityImpact | LOW |
AttackComplexity | LOW |
Scope | CHANGED |
AttackVector | NETWORK |
AvailabilityImpact | NONE |
IntegrityImpact | LOW |
PrivilegesRequired | NONE |
BaseScore | 6.1 |
VectorString | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
Version | 3.1 |
UserInteraction | REQUIRED |
CvssV2 impact
AccessComplexity | MEDIUM |
ConfidentialityImpact | NONE |
AvailabilityImpact | NONE |
IntegrityImpact | PARTIAL |
BaseScore | 4.300000190734863 |
VectorString | AV:N/AC:M/Au:N/C:N/I:P/A:N |
Version | 2.0 |
AccessVector | NETWORK |
Authentication | NONE |