omero-web@5.6.dev3 vulnerabilities

OMERO.web

Direct Vulnerabilities

Known vulnerabilities in the omero-web package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Cross-site Scripting (XSS)

omero-web is an OMERO.web

Affected versions of this package are vulnerable to Cross-site Scripting (XSS). A variety of templates do not perform proper sanitization through HTML escaping. Due to the lack of sanitization and use of jQuery.html(), there are a whole host of XSS possibilities with specially crafted input to a variety of fields.

How to fix Cross-site Scripting (XSS)?

Upgrade omero-web to version 5.11.0 or higher.

[,5.11.0)
  • M
Information Exposure

omero-web is an OMERO.web

Affected versions of this package are vulnerable to Information Exposure. If a user clicks a malicious link in OMERO.web, sensitive information in query parameters may be exposed via the Referrer header

How to fix Information Exposure?

Upgrade omero-web to version 5.6.3 or higher.

[,5.6.3)
  • M
Information Exposure

omero-web is an OMERO.web

Affected versions of this package are vulnerable to Information Exposure. OMERO.web loads various information about the current user such as their id, name and the groups they are in, and these are available on the main webclient pages.

How to fix Information Exposure?

Upgrade omero-web to version 5.9.0 or higher.

[,5.9.0)
  • M
Improper Input Validation

omero-web is an OMERO.web

Affected versions of this package are vulnerable to Improper Input Validation. OMERO.web supports redirection to a given URL after performing login or switching the group context. These URLs are not validated, allowing redirection to untrusted sites.

How to fix Improper Input Validation?

Upgrade omero-web to version 5.9.0 or higher.

[,5.9.0)