CVE-2020-7932 – omero-web
Package
Manager: pip
Name: omero-web
Vulnerable Version: >=0 <5.6.3
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00345 pctl0.56398
Details
OMERO-web Sensitive Data Exposure OMERO.web before 5.6.3 optionally allows sensitive data elements (e.g., a session key) to be passed as URL query parameters. If an attacker tricks a user into clicking a malicious link in OMERO.web, the information in the query parameters may be exposed in the Referer header seen by the target. Information in the URL path such as object IDs may also be exposed.
Metadata
Created: 2022-05-24T17:20:49Z
Modified: 2024-10-07T21:01:24Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-vwxv-frj6-fhc9/GHSA-vwxv-frj6-fhc9.json
CWE IDs: ["CWE-200"]
Alternative ID: GHSA-vwxv-frj6-fhc9
Finding: F038
Auto approve: 1