CVE-2020-5206
Summary
| CVE | CVE-2020-5206 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-01-30 22:15:00 UTC |
| Updated | 2020-02-05 18:30:00 UTC |
| Description | In Opencast before 7.6 and 8.1, using a remember-me cookie with an arbitrary username can cause Opencast to assume proper authentication for that user even if the remember-me cookie was incorrect given that the attacked endpoint also allows anonymous access. This way, an attacker can, for example, fake a remember-me token, assume the identity of the global system administrator and request non-public content from the search service without ever providing any proper authentication. This problem is fixed in Opencast 7.6 and Opencast 8.1 |
Risk And Classification
Problem Types: CWE-287
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Authentication Bypass For Endpoints With Anonymous Access · opencast/opencast@b157e1f · GitHub | MISC | github.com | Patch |
| Authentication Bypass For Endpoints With Anonymous Access · Advisory · opencast/opencast · GitHub | CONFIRM | github.com | Mitigation, Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 980398 Java (maven) Security Update for org.opencastproject:opencast-kernel (GHSA-vmm6-w4cf-7f3x)