CVE-2021-41132

medium

Description

OMERO.web provides a web based client and plugin infrastructure. In versions prior to 5.11.0, a variety of templates do not perform proper sanitization through HTML escaping. Due to the lack of sanitization and use of ``jQuery.html()``, there are a whole host of cross-site scripting possibilities with specially crafted input to a variety of fields. This issue is patched in version 5.11.0. There are no known workarounds aside from upgrading.

References

https://www.openmicroscopy.org/security/advisories/2021-SV3/

https://github.com/ome/omero-web/security/advisories/GHSA-g67g-hvc3-xmvf

https://github.com/ome/omero-web/commit/0168067accde5e635341b3c714b1d53ae92ba424

Details

Source: Mitre, NVD

Published: 2021-10-14

Updated: 2021-10-20

Risk Information

CVSS v2

Base Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Severity: Medium

CVSS v3

Base Score: 6.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Severity: Medium