First published: Thu Jan 30 2020(Updated: )
Opencast before 7.6 and 8.1 enables a remember-me cookie based on a hash created from the username, password, and an additional system key. This means that an attacker getting access to a remember-me token for one server can get access to all servers which allow log-in using the same credentials without ever needing the credentials. This problem is fixed in Opencast 7.6 and Opencast 8.1
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apereo Opencast | <7.6 | |
Apereo Opencast | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-5222 is a vulnerability in Opencast versions before 7.6 and 8.1 that enables a remember-me cookie based on a hash created from the username, password, and an additional system key.
CVE-2020-5222 affects Opencast versions before 7.6 and 8.1, allowing an attacker who gains access to a remember-me token for one server to access all servers that use the same credentials.
CVE-2020-5222 has a severity level of 8.8 (high).
To fix CVE-2020-5222, you should update Opencast to version 7.6 or 8.1, which include the necessary security patches.
You can find more information about CVE-2020-5222 in the Opencast GitHub commit and the Opencast security advisory mentioned in the references.