Improper Authorization Affecting org.opencastproject:opencast-kernel package, versions [8.0,8.1)[,7.6)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.14% (50th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JAVA-ORGOPENCASTPROJECT-543833
  • published31 Jan 2020
  • disclosed30 Jan 2020
  • creditUnknown

Introduced: 30 Jan 2020

CVE-2020-5206  (opens in a new tab)
CWE-285  (opens in a new tab)

How to fix?

Upgrade org.opencastproject:opencast-kernel to version 8.1, 7.6 or higher.

Overview

org.opencastproject:opencast-kernel is a free and open source solution for automated video capture and distribution at scale.

Affected versions of this package are vulnerable to Improper Authorization. Using a remember-me cookie with an arbitrary username can cause Opencast to assume proper authentication for that user even if the remember-me cookie was incorrect given that the attacked endpoint also allows anonymous access. This way, an attacker can, for example, fake a remember-me token, assume the identity of the global system administrator and request non-public content from the search service without ever providing any proper authentication.

CVSS Scores

version 3.1