CVE-2021-32623

Opencast is a free and open source solution for automated video capture and distribution. Versions of Opencast prior to 9.6 are vulnerable to the billion laughs attack, which allows an attacker to easily execute a (seemingly permanent) denial of service attack, essentially taking down Opencast using a single HTTP request. To exploit this, users need to have ingest privileges, limiting the group of potential attackers The problem has been fixed in Opencast 9.6. There is no known workaround for this issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:apereo:opencast:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:07

Type Values Removed Values Added
References () https://github.com/opencast/opencast/commit/8ae27da5a6f658011a5741b3210e715b0dc6213e - Patch, Third Party Advisory () https://github.com/opencast/opencast/commit/8ae27da5a6f658011a5741b3210e715b0dc6213e - Patch, Third Party Advisory
References () https://github.com/opencast/opencast/security/advisories/GHSA-9gwx-9cwp-5c2m - Exploit, Third Party Advisory () https://github.com/opencast/opencast/security/advisories/GHSA-9gwx-9cwp-5c2m - Exploit, Third Party Advisory
CVSS v2 : 4.0
v3 : 6.5
v2 : 4.0
v3 : 8.1

Information

Published : 2021-06-16 00:15

Updated : 2024-11-21 06:07


NVD link : CVE-2021-32623

Mitre link : CVE-2021-32623

CVE.ORG link : CVE-2021-32623


JSON object : View

Products Affected

apereo

  • opencast
CWE
CWE-776

Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')