Opencast before 7.6 and 8.1 enables a remember-me cookie based on a hash created from the username, password, and an additional system key. This means that an attacker getting access to a remember-me token for one server can get access to all servers which allow log-in using the same credentials without ever needing the credentials. This problem is fixed in Opencast 7.6 and Opencast 8.1
References
Link | Resource |
---|---|
https://github.com/opencast/opencast/commit/1a7172c95af8d542a77ae5b153e4c834dd4788a6 | Patch |
https://github.com/opencast/opencast/security/advisories/GHSA-mh8g-hprg-8363 | Mitigation Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2020-01-30 13:15
Updated : 2020-02-05 10:51
NVD link : CVE-2020-5222
Mitre link : CVE-2020-5222
JSON object : View
CWE
CWE-798
Use of Hard-coded Credentials
Products Affected
apereo
- opencast