2024-12-08 03:06:42 +00:00

113 lines
3.6 KiB
JSON

{
"id": "CVE-2020-7932",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-06-17T17:15:10.753",
"lastModified": "2024-11-21T05:38:02.157",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "OMERO.web before 5.6.3 optionally allows sensitive data elements (e.g., a session key) to be passed as URL query parameters. If an attacker tricks a user into clicking a malicious link in OMERO.web, the information in the query parameters may be exposed in the Referer header seen by the target. Information in the URL path such as object IDs may also be exposed."
},
{
"lang": "es",
"value": "OMERO.web versiones anteriores a 5.6.3, opcionalmente permite que los elementos de datos confidenciales (por ejemplo, una clave de sesi\u00f3n) sean pasados como par\u00e1metros de consulta de URL. Si un atacante enga\u00f1a a un usuario para que haga clic en un enlace malicioso en OMERO.web, la informaci\u00f3n en los par\u00e1metros de consulta puede exponerse en el encabezado Referer visto por el objetivo. Tambi\u00e9n puede ser expuesta informaci\u00f3n en la ruta de la URL, tales como los ID de los objetos"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.1,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N",
"baseScore": 3.5,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "LOW",
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openmicroscopy:omero.web:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.6.3",
"matchCriteriaId": "8AC9EF6D-87D6-42C9-864B-3B8C06FAE6E4"
}
]
}
]
}
],
"references": [
{
"url": "https://www.openmicroscopy.org/security/advisories/2019-SV4/",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.openmicroscopy.org/security/advisories/2019-SV4/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}