Description
OMERO.web provides a web based client and plugin infrastructure. In versions prior to 5.11.0, a variety of templates do not perform proper sanitization through HTML escaping. Due to the lack of sanitization and use of ``jQuery.html()``, there are a whole host of cross-site scripting possibilities with specially crafted input to a variety of fields. This issue is patched in version 5.11.0. There are no known workarounds aside from upgrading.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-0156 | OMERO.web provides a web based client and plugin infrastructure. In versions prior to 5.11.0, a variety of templates do not perform proper sanitization through HTML escaping. Due to the lack of sanitization and use of ``jQuery.html()``, there are a whole host of cross-site scripting possibilities with specially crafted input to a variety of fields. This issue is patched in version 5.11.0. There are no known workarounds aside from upgrading. |
Github GHSA |
GHSA-g67g-hvc3-xmvf | Inconsistent input sanitisation leads to XSS vectors |
References
History
No history.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-04T02:59:31.416Z
Reserved: 2021-09-15T00:00:00.000Z
Link: CVE-2021-41132
No data.
Status : Modified
Published: 2021-10-14T16:15:09.447
Modified: 2024-11-21T06:25:32.857
Link: CVE-2021-41132
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA