Improper Authorization Affecting org.opencastproject:opencast-kernel package, versions [8.0,8.1)[,7.6)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.09% (39th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JAVA-ORGOPENCASTPROJECT-543831
  • published31 Jan 2020
  • disclosed30 Jan 2020
  • creditLukas Kalbertodt

Introduced: 30 Jan 2020

CVE-2020-5222  (opens in a new tab)
CWE-285  (opens in a new tab)

How to fix?

Upgrade org.opencastproject:opencast-kernel to version 8.1, 7.6 or higher.

Overview

org.opencastproject:opencast-kernel is a free and open source solution for automated video capture and distribution at scale.

Affected versions of this package are vulnerable to Improper Authorization. Enables a remember-me cookie based on a hash created from the username, password, and an additional system key. This means that an attacker getting access to a remember-me token for one server can get access to all servers which allow log-in using the same credentials without ever needing the credentials.

Such an attack will usually not work on different installations – assuming that safe, unique passwords are used – but it is basically guaranteed to work to get access to all machines of one cluster if a token from one machine is compromised.

CVSS Scores

version 3.1