OMERO.web is open source Django-based software for managing microscopy imaging. OMERO.web before version 5.9.0 loads various information about the current user such as their id, name and the groups they are in, and these are available on the main webclient pages. This represents an information exposure vulnerability. Some additional information being loaded is not used by the webclient and is being removed in this release. This is fixed in version 5.9.0.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-0157 | OMERO.web is open source Django-based software for managing microscopy imaging. OMERO.web before version 5.9.0 loads various information about the current user such as their id, name and the groups they are in, and these are available on the main webclient pages. This represents an information exposure vulnerability. Some additional information being loaded is not used by the webclient and is being removed in this release. This is fixed in version 5.9.0. |
Github GHSA |
GHSA-gfp2-w5jm-955q | OMERO.web exposes some unnecessary session information in the page |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-03T18:09:15.994Z
Reserved: 2020-12-22T00:00:00
Link: CVE-2021-21376
No data.
Status : Modified
Published: 2021-03-23T16:15:14.173
Modified: 2024-11-21T05:48:13.773
Link: CVE-2021-21376
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA