OMERO.web before 5.6.3 optionally allows sensitive data elements (e.g., a session key) to be passed as URL query parameters. If an attacker tricks a user into clicking a malicious link in OMERO.web, the information in the query parameters may be exposed in the Referer header seen by the target. Information in the URL path such as object IDs may also be exposed.
References
Link | Resource |
---|---|
https://www.openmicroscopy.org/security/advisories/2019-SV4/ | Vendor Advisory |
https://www.openmicroscopy.org/security/advisories/2019-SV4/ | Vendor Advisory |
Configurations
History
21 Nov 2024, 05:38
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.openmicroscopy.org/security/advisories/2019-SV4/ - Vendor Advisory |
Information
Published : 2020-06-17 17:15
Updated : 2024-11-21 05:38
NVD link : CVE-2020-7932
Mitre link : CVE-2020-7932
CVE.ORG link : CVE-2020-7932
JSON object : View
Products Affected
openmicroscopy
- omero.web
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor