Lucene search

K
cvelistGitHub_MCVELIST:CVE-2021-41132
HistoryOct 14, 2021 - 3:45 p.m.

CVE-2021-41132 Inconsistent input sanitisation leads to XSS vectors

2021-10-1415:45:12
CWE-116
GitHub_M
www.cve.org
5
cve-2021-41132
input sanitisation
cross-site scripting
html escaping
jquery.html()
patched
upgrade

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9

Confidence

High

EPSS

0.001

Percentile

34.8%

OMERO.web provides a web based client and plugin infrastructure. In versions prior to 5.11.0, a variety of templates do not perform proper sanitization through HTML escaping. Due to the lack of sanitization and use of jQuery.html(), there are a whole host of cross-site scripting possibilities with specially crafted input to a variety of fields. This issue is patched in version 5.11.0. There are no known workarounds aside from upgrading.

CNA Affected

[
  {
    "product": "omero-web",
    "vendor": "ome",
    "versions": [
      {
        "status": "affected",
        "version": "< 5.11.0"
      }
    ]
  }
]

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9

Confidence

High

EPSS

0.001

Percentile

34.8%

Related for CVELIST:CVE-2021-41132