CVE-2020-5206

In Opencast before 7.6 and 8.1, using a remember-me cookie with an arbitrary username can cause Opencast to assume proper authentication for that user even if the remember-me cookie was incorrect given that the attacked endpoint also allows anonymous access. This way, an attacker can, for example, fake a remember-me token, assume the identity of the global system administrator and request non-public content from the search service without ever providing any proper authentication. This problem is fixed in Opencast 7.6 and Opencast 8.1
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apereo:opencast:*:*:*:*:*:*:*:*
cpe:2.3:a:apereo:opencast:8.0:*:*:*:*:*:*:*

History

21 Nov 2024, 05:33

Type Values Removed Values Added
References () https://github.com/opencast/opencast/commit/b157e1fb3b35991ca7bf59f0730329fbe7ce82e8 - Patch () https://github.com/opencast/opencast/commit/b157e1fb3b35991ca7bf59f0730329fbe7ce82e8 - Patch
References () https://github.com/opencast/opencast/security/advisories/GHSA-vmm6-w4cf-7f3x - Mitigation, Third Party Advisory () https://github.com/opencast/opencast/security/advisories/GHSA-vmm6-w4cf-7f3x - Mitigation, Third Party Advisory
CVSS v2 : 6.4
v3 : 10.0
v2 : 6.4
v3 : 8.7

Information

Published : 2020-01-30 22:15

Updated : 2024-11-21 05:33


NVD link : CVE-2020-5206

Mitre link : CVE-2020-5206

CVE.ORG link : CVE-2020-5206


JSON object : View

Products Affected

apereo

  • opencast
CWE
CWE-285

Improper Authorization

CWE-287

Improper Authentication