OMERO.web provides a web based client and plugin infrastructure. There is currently no escaping or validation of the `callback` parameter that can be passed to various OMERO.web endpoints that have JSONP enabled. This vulnerability has been patched in version 5.26.0.
References
Configurations
No configuration.
History
21 Nov 2024, 09:19
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://github.com/ome/omero-web/commit/d41207cbb82afc56ea79e84db532608aa24ab4aa - | |
References | () https://github.com/ome/omero-web/security/advisories/GHSA-vr85-5pwx-c6gq - |
21 May 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-21 13:15
Updated : 2024-11-21 09:19
NVD link : CVE-2024-35180
Mitre link : CVE-2024-35180
CVE.ORG link : CVE-2024-35180
JSON object : View
Products Affected
No product.
CWE
CWE-830
Inclusion of Web Functionality from an Untrusted Source