logo

CVE-2020-7932 omero-web

Package

Manager: pip
Name: omero-web
Vulnerable Version: >=0 <5.6.3

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00345 pctl0.56398

Details

OMERO-web Sensitive Data Exposure OMERO.web before 5.6.3 optionally allows sensitive data elements (e.g., a session key) to be passed as URL query parameters. If an attacker tricks a user into clicking a malicious link in OMERO.web, the information in the query parameters may be exposed in the Referer header seen by the target. Information in the URL path such as object IDs may also be exposed.

Metadata

Created: 2022-05-24T17:20:49Z
Modified: 2024-10-07T21:01:24Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-vwxv-frj6-fhc9/GHSA-vwxv-frj6-fhc9.json
CWE IDs: ["CWE-200"]
Alternative ID: GHSA-vwxv-frj6-fhc9
Finding: F038
Auto approve: 1