2014-SV3 CSRF

affects OMERO.web versions 5.0.5 and earlier

back to Advisories

Synopsis

Forms in OMERO.web are susceptible to CSRF attacks.

Background

CSRF (cross-site request forgery) is also known as a one-click attack or session riding. It's a type of malicious exploit where unauthorized commands are transmitted from a user that the website trusts.

Affected Packages

OMERO.web versions prior to 5.0.6.

Impact

If a user can be convinced or tricked into opening an untrusted webpage from a browser where they've previously logged into OMERO, the OMERO.web session can be reused to access OMERO as that user.

Due to the complexity of such an exploit, we do not consider this a critical security vulnerability.

Workaround

Users should actively logout when finished working with OMERO.web and take care when accessing non-trusted websites.

Resolution

All OMERO.servers should be upgraded to at least 5.0.6.

Thanks

Leif Nixon for notifying the OME team of this security issue via our secure mailing list and filing a CVE (CVE-2014-7198).


back to top