Opencast is a free and open source solution for automated video capture and distribution. Versions of Opencast prior to 9.6 are vulnerable to the billion laughs attack, which allows an attacker to easily execute a (seemingly permanent) denial of service attack, essentially taking down Opencast using a single HTTP request. To exploit this, users need to have ingest privileges, limiting the group of potential attackers The problem has been fixed in Opencast 9.6. There is no known workaround for this issue.
References
Link | Resource |
---|---|
https://github.com/opencast/opencast/commit/8ae27da5a6f658011a5741b3210e715b0dc6213e | Patch Third Party Advisory |
https://github.com/opencast/opencast/security/advisories/GHSA-9gwx-9cwp-5c2m | Exploit Third Party Advisory |
https://github.com/opencast/opencast/commit/8ae27da5a6f658011a5741b3210e715b0dc6213e | Patch Third Party Advisory |
https://github.com/opencast/opencast/security/advisories/GHSA-9gwx-9cwp-5c2m | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 06:07
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/opencast/opencast/commit/8ae27da5a6f658011a5741b3210e715b0dc6213e - Patch, Third Party Advisory | |
References | () https://github.com/opencast/opencast/security/advisories/GHSA-9gwx-9cwp-5c2m - Exploit, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 4.0
v3 : 8.1 |
Information
Published : 2021-06-16 00:15
Updated : 2024-11-21 06:07
NVD link : CVE-2021-32623
Mitre link : CVE-2021-32623
CVE.ORG link : CVE-2021-32623
JSON object : View
Products Affected
apereo
- opencast
CWE
CWE-776
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')