Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS12cjg1LTVwd3gtYzZncc4AA8W0
OMERO.web must check that the JSONP callback is a valid function
Background
There is currently no escaping or validation of the callback
parameter that can be passed to various OMERO.web endpoints that have JSONP enabled. One such endpoint is /webclient/imgData/...
. As we only really use these endpoints with jQuery's own callback name generation ^1 it is quite difficult or even impossible to exploit this in vanilla OMERO.web. However, these metadata endpoints are likely to be used by many plugins.
Impact
OMERO.web before 5.25.0
Patches
Users should upgrade to 5.26.0 or higher
Workarounds
None
References
- https://stackoverflow.com/questions/2777021/do-i-need-to-sanitize-the-callback-parameter-from-a-jsonp-call
- https://stackoverflow.com/questions/1661197/what-characters-are-valid-for-javascript-variable-names
For more information
If you have any questions or comments about this advisory:
Open an issue in omero-web
Email us at [email protected]
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS12cjg1LTVwd3gtYzZncc4AA8W0
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: 6 months ago
Updated: 6 months ago
CVSS Score: 6.1
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Identifiers: GHSA-vr85-5pwx-c6gq, CVE-2024-35180
References:
- https://github.com/ome/omero-web/security/advisories/GHSA-vr85-5pwx-c6gq
- https://github.com/ome/omero-web/commit/d41207cbb82afc56ea79e84db532608aa24ab4aa
- https://nvd.nist.gov/vuln/detail/CVE-2024-35180
- https://github.com/advisories/GHSA-vr85-5pwx-c6gq
Blast Radius: 8.4
Affected Packages
pypi:omero-web
Dependent packages: 13Dependent repositories: 24
Downloads: 3,126 last month
Affected Version Ranges: < 5.26.0
Fixed in: 5.26.0
All affected versions: 5.6.0, 5.6.1, 5.6.2, 5.6.3, 5.7.0, 5.7.1, 5.8.0, 5.8.1, 5.9.0, 5.9.1, 5.9.2, 5.10.0, 5.11.0, 5.12.0, 5.12.1, 5.13.0, 5.14.0, 5.14.1, 5.15.0, 5.16.0, 5.17.0, 5.18.0, 5.19.0, 5.20.0, 5.21.0, 5.22.0, 5.22.1, 5.23.0, 5.24.0, 5.25.0
All unaffected versions: 5.26.0, 5.27.0, 5.27.1, 5.27.2, 5.28.0