PYSEC-2021-372

See a problem?
Import Source
https://github.com/pypa/advisory-database/blob/main/vulns/omero-web/PYSEC-2021-372.yaml
JSON Data
https://api.osv.dev/v1/vulns/PYSEC-2021-372
Aliases
Published
2021-10-14T16:15:00Z
Modified
2023-11-08T04:06:52.354646Z
Summary
[none]
Details

OMERO.web provides a web based client and plugin infrastructure. In versions prior to 5.11.0, a variety of templates do not perform proper sanitization through HTML escaping. Due to the lack of sanitization and use of jQuery.html(), there are a whole host of cross-site scripting possibilities with specially crafted input to a variety of fields. This issue is patched in version 5.11.0. There are no known workarounds aside from upgrading.

References

Affected packages

PyPI / omero-web

Package

Affected ranges

Type
GIT
Repo
https://github.com/ome/omero-web
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.11.0

Affected versions

5.*

5.5.dev1
5.5.dev2
5.6.dev1
5.6.dev2
5.6.dev3
5.6.dev4
5.6.dev5
5.6.dev6
5.6.dev7
5.6.0
5.6.1
5.6.2
5.6.3
5.7.0
5.7.1
5.8.0
5.8.1
5.9.0
5.9.1
5.9.2
5.10.0
5.11.0rc1