CVE-2020-5222

Opencast before 7.6 and 8.1 enables a remember-me cookie based on a hash created from the username, password, and an additional system key. This means that an attacker getting access to a remember-me token for one server can get access to all servers which allow log-in using the same credentials without ever needing the credentials. This problem is fixed in Opencast 7.6 and Opencast 8.1
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apereo:opencast:*:*:*:*:*:*:*:*
cpe:2.3:a:apereo:opencast:8.0:*:*:*:*:*:*:*

History

21 Nov 2024, 05:33

Type Values Removed Values Added
CVSS v2 : 6.5
v3 : 8.8
v2 : 6.5
v3 : 6.8
References () https://github.com/opencast/opencast/commit/1a7172c95af8d542a77ae5b153e4c834dd4788a6 - Patch () https://github.com/opencast/opencast/commit/1a7172c95af8d542a77ae5b153e4c834dd4788a6 - Patch
References () https://github.com/opencast/opencast/security/advisories/GHSA-mh8g-hprg-8363 - Mitigation, Third Party Advisory () https://github.com/opencast/opencast/security/advisories/GHSA-mh8g-hprg-8363 - Mitigation, Third Party Advisory

Information

Published : 2020-01-30 21:15

Updated : 2024-11-21 05:33


NVD link : CVE-2020-5222

Mitre link : CVE-2020-5222

CVE.ORG link : CVE-2020-5222


JSON object : View

Products Affected

apereo

  • opencast
CWE
CWE-798

Use of Hard-coded Credentials