Exposure of Sensitive Information to an Unauthorized Actor
CVE-2020-7932
Summary
OMERO.web through 5.6.2 optionally allows sensitive data elements (e.g., a session key) to be passed as URL query parameters. If an attacker tricks a user into clicking a malicious link in OMERO.web, the information in the query parameters may be exposed in the `Referer` header seen by the target. Information in the URL path such as object IDs may also be exposed.
- LOW
- NETWORK
- NONE
- UNCHANGED
- REQUIRED
- LOW
- HIGH
- NONE
CWE-200 - Information Exposure
An information exposure vulnerability is categorized as an information flow (IF) weakness, which can potentially allow unauthorized access to otherwise classified information in the application, such as confidential personal information (demographics, financials, health records, etc.), business secrets, and the application's internal environment.
References
Advisory Timeline
- Published