CVE-2021-32623
Summary
| CVE | CVE-2021-32623 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-06-16 00:15:00 UTC |
| Updated | 2021-06-23 19:55:00 UTC |
| Description | Opencast is a free and open source solution for automated video capture and distribution. Versions of Opencast prior to 9.6 are vulnerable to the billion laughs attack, which allows an attacker to easily execute a (seemingly permanent) denial of service attack, essentially taking down Opencast using a single HTTP request. To exploit this, users need to have ingest privileges, limiting the group of potential attackers The problem has been fixed in Opencast 9.6. There is no known workaround for this issue. |
Risk And Classification
Problem Types: CWE-776
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Clarifies debug options in setenv file (#2735) · opencast/opencast@8ae27da · GitHub | MISC | github.com | |
| Opencast vulnerable to billion laughs attack (XML bomb) · Advisory · opencast/opencast · GitHub | CONFIRM | github.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 980389 Java (maven) Security Update for org.opencastproject:opencast-kernel (GHSA-9gwx-9cwp-5c2m)