Vulnerability Description
Opencast before 7.6 and 8.1 enables a remember-me cookie based on a hash created from the username, password, and an additional system key. This means that an attacker getting access to a remember-me token for one server can get access to all servers which allow log-in using the same credentials without ever needing the credentials. This problem is fixed in Opencast 7.6 and Opencast 8.1
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apereo | Opencast | < 7.6 |
Related Weaknesses (CWE)
References
- https://github.com/opencast/opencast/commit/1a7172c95af8d542a77ae5b153e4c834dd47Patch
- https://github.com/opencast/opencast/security/advisories/GHSA-mh8g-hprg-8363MitigationThird Party Advisory
- https://github.com/opencast/opencast/commit/1a7172c95af8d542a77ae5b153e4c834dd47Patch
- https://github.com/opencast/opencast/security/advisories/GHSA-mh8g-hprg-8363MitigationThird Party Advisory
FAQ
What is CVE-2020-5222?
CVE-2020-5222 is a vulnerability with a CVSS score of 6.8 (MEDIUM). Opencast before 7.6 and 8.1 enables a remember-me cookie based on a hash created from the username, password, and an additional system key. This means that an attacker getting access to a remember-me ...
How severe is CVE-2020-5222?
CVE-2020-5222 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-5222?
Check the references section above for vendor advisories and patch information. Affected products include: Apereo Opencast.