Filtered by vendor Openmicroscopy
Subscribe
Total
14 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2021-41132 | 1 Openmicroscopy | 2 Omero-figure, Omero-web | 2021-10-20 | 4.3 MEDIUM | 6.1 MEDIUM |
OMERO.web provides a web based client and plugin infrastructure. In versions prior to 5.11.0, a variety of templates do not perform proper sanitization through HTML escaping. Due to the lack of sanitization and use of ``jQuery.html()``, there are a whole host of cross-site scripting possibilities with specially crafted input to a variety of fields. This issue is patched in version 5.11.0. There are no known workarounds aside from upgrading. | |||||
CVE-2019-9944 | 1 Openmicroscopy | 1 Omero.server | 2021-07-21 | 5.0 MEDIUM | 7.5 HIGH |
In Open Microscopy Environment OMERO.server 5.0.0 through 5.6.0, the reading of files from imported image filesets may circumvent OMERO permissions restrictions. This occurs because the Bio-Formats feature allows an image file to have embedded pathnames. | |||||
CVE-2019-16244 | 1 Openmicroscopy | 1 Omero.server | 2021-07-21 | 7.5 HIGH | 9.8 CRITICAL |
OMERO.server before 5.6.1 allows attackers to bypass the security filters and access hidden objects via a crafted query. | |||||
CVE-2019-16245 | 1 Openmicroscopy | 1 Omero | 2021-07-21 | 5.0 MEDIUM | 5.3 MEDIUM |
OMERO before 5.6.1 makes the details of each user available to all users. | |||||
CVE-2020-6752 | 1 Openmicroscopy | 1 Omero | 2021-07-21 | 5.5 MEDIUM | 3.8 LOW |
In OMERO before 5.6.1, group owners can access members' data in other groups. | |||||
CVE-2021-21377 | 1 Openmicroscopy | 1 Omero.web | 2021-03-26 | 4.9 MEDIUM | 5.4 MEDIUM |
OMERO.web is open source Django-based software for managing microscopy imaging. OMERO.web before version 5.9.0 supports redirection to a given URL after performing login or switching the group context. These URLs are not validated, allowing redirection to untrusted sites. OMERO.web 5.9.0 adds URL validation before redirecting. External URLs are not considered valid, unless specified in the omero.web.redirect_allowed_hosts setting. | |||||
CVE-2021-21376 | 1 Openmicroscopy | 1 Omero.web | 2021-03-26 | 5.0 MEDIUM | 6.5 MEDIUM |
OMERO.web is open source Django-based software for managing microscopy imaging. OMERO.web before version 5.9.0 loads various information about the current user such as their id, name and the groups they are in, and these are available on the main webclient pages. This represents an information exposure vulnerability. Some additional information being loaded is not used by the webclient and is being removed in this release. This is fixed in version 5.9.0. | |||||
CVE-2020-7932 | 1 Openmicroscopy | 1 Omero.web | 2020-06-24 | 3.5 LOW | 5.7 MEDIUM |
OMERO.web before 5.6.3 optionally allows sensitive data elements (e.g., a session key) to be passed as URL query parameters. If an attacker tricks a user into clicking a malicious link in OMERO.web, the information in the query parameters may be exposed in the Referer header seen by the target. Information in the URL path such as object IDs may also be exposed. | |||||
CVE-2019-9943 | 1 Openmicroscopy | 1 Omero.server | 2020-06-24 | 5.0 MEDIUM | 7.5 HIGH |
In ome.services.graphs.GraphTraversal.findObjectDetails in Open Microscopy Environment OMERO.server 5.1.0 through 5.6.0, permissions on OMERO model objects may be circumvented during certain operations such as move and delete, because group permissions are mishandled. | |||||
CVE-2018-1000634 | 1 Openmicroscopy | 1 Omero | 2019-10-02 | 6.5 MEDIUM | 7.2 HIGH |
The Open Microscopy Environment OMERO.server version 5.4.0 to 5.4.6 contains an Improper Access Control vulnerability in User management that can result in administrative user with privilege restrictions logging in as a more powerful administrator. This attack appear to be exploitable via Use user administration privilege to set the password of a more powerful administrator. This vulnerability appears to have been fixed in 5.4.7. | |||||
CVE-2017-1000438 | 1 Openmicroscopy | 1 Omero | 2019-10-02 | 6.5 MEDIUM | 8.3 HIGH |
In OMERO 5.3.3 or earlier a user could create an OriginalFile and adjust its path such that it now points to another user's file on the underlying filesystem, then manipulate the user's data. | |||||
CVE-2014-7198 | 1 Openmicroscopy | 1 Omero | 2019-04-01 | 6.8 MEDIUM | 8.8 HIGH |
OMERO before 5.0.6 has multiple CSRF vulnerabilities because the framework for OMERO's web interface lacks CSRF protection. | |||||
CVE-2018-1000635 | 1 Openmicroscopy | 1 Omero | 2018-10-12 | 7.2 HIGH | 6.7 MEDIUM |
The Open Microscopy Environment OMERO.server version 5.4.0 to 5.4.6 contains a Information Exposure Through Sent Data vulnerability in OMERO.server that can result in an Attacker gaining full administrative access to server and may be able to disable it. This vulnerability appears to have been fixed in 5.4.7. | |||||
CVE-2018-1000633 | 1 Openmicroscopy | 1 Omero | 2018-10-12 | 4.0 MEDIUM | 7.2 HIGH |
The Open Microscopy Environment OMERO.web version prior to 5.4.7 contains an Information Exposure Through Log Files vulnerability in the login form and change password form that can result in User's password being revealed. Attacker can log in as that user. This attack appear to be exploitable via an attacker reading the web server log. This vulnerability appears to have been fixed in 5.4.7. |