CVE-2021-21376

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-21376
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-21376.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2021-21376
Aliases
Published
2021-03-23T16:15:14Z
Modified
2024-10-12T06:47:16.839515Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

OMERO.web is open source Django-based software for managing microscopy imaging. OMERO.web before version 5.9.0 loads various information about the current user such as their id, name and the groups they are in, and these are available on the main webclient pages. This represents an information exposure vulnerability. Some additional information being loaded is not used by the webclient and is being removed in this release. This is fixed in version 5.9.0.

References

Affected packages

Git / github.com/ome/omero-web

Affected ranges

Type
GIT
Repo
https://github.com/ome/omero-web
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v5.*

v5.5.dev1
v5.5.dev2
v5.6.0
v5.6.1
v5.6.2
v5.6.3
v5.6.dev1
v5.6.dev2
v5.6.dev3
v5.6.dev4
v5.6.dev5
v5.6.dev6
v5.6.dev7
v5.7.0
v5.7.1
v5.8.0
v5.8.1