{"api_version":"1","generated_at":"2026-04-23T17:27:21+00:00","cve":"CVE-2020-5230","urls":{"html":"https://cve.report/CVE-2020-5230","api":"https://cve.report/api/cve/CVE-2020-5230.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-5230","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-5230"},"summary":{"title":"CVE-2020-5230","description":"Opencast before 8.1 and 7.6 allows almost arbitrary identifiers for media packages and elements to be used. This can be problematic for operation and security since such identifiers are sometimes used for file system operations which may lead to an attacker being able to escape working directories and write files to other locations. In addition, Opencast's Id.toString(…) vs Id.compact(…) behavior, the latter trying to mitigate some of the file system problems, can cause errors due to identifier mismatch since an identifier may unintentionally change. This issue is fixed in Opencast 7.6 and 8.1.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2020-01-30 21:15:00","updated_at":"2020-02-10 21:55:00"},"problem_types":["CWE-74"],"metrics":[],"references":[{"url":"https://github.com/opencast/opencast/security/advisories/GHSA-w29m-fjp4-qhmq","name":"https://github.com/opencast/opencast/security/advisories/GHSA-w29m-fjp4-qhmq","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Unsafe Identifiers · Advisory · opencast/opencast · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://github.com/opencast/opencast/commit/bbb473f34ab95497d6c432c81285efb0c739f317","name":"https://github.com/opencast/opencast/commit/bbb473f34ab95497d6c432c81285efb0c739f317","refsource":"MISC","tags":["Patch"],"title":"Limit Characters Allowed In Ids · opencast/opencast@bbb473f · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-5230","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-5230","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2020","cve_id":"5230","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apereo","cpe5":"opencast","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"5230","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apereo","cpe5":"opencast","cpe6":"8.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"5230","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apereo","cpe5":"opencast","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"5230","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apereo","cpe5":"opencast","cpe6":"8.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2020-5230","qid":"982990","title":"Java (maven) Security Update for org.opencastproject:base (GHSA-w29m-fjp4-qhmq)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security-advisories@github.com","ID":"CVE-2020-5230","STATE":"PUBLIC","TITLE":"Opencast uses unsafe identifiers"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"opencast","version":{"version_data":[{"version_value":"< 7.6"},{"version_value":">= 8.0, < 8.1"}]}}]},"vendor_name":"opencast"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Opencast before 8.1 and 7.6 allows almost arbitrary identifiers for media packages and elements to be used. This can be problematic for operation and security since such identifiers are sometimes used for file system operations which may lead to an attacker being able to escape working directories and write files to other locations. In addition, Opencast's Id.toString(…) vs Id.compact(…) behavior, the latter trying to mitigate some of the file system problems, can cause errors due to identifier mismatch since an identifier may unintentionally change. This issue is fixed in Opencast 7.6 and 8.1."}]},"impact":{"cvss":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":7.7,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-99: Improper Control of Resource Identifiers ('Resource Injection')"}]}]},"references":{"reference_data":[{"name":"https://github.com/opencast/opencast/security/advisories/GHSA-w29m-fjp4-qhmq","refsource":"CONFIRM","url":"https://github.com/opencast/opencast/security/advisories/GHSA-w29m-fjp4-qhmq"},{"name":"https://github.com/opencast/opencast/commit/bbb473f34ab95497d6c432c81285efb0c739f317","refsource":"MISC","url":"https://github.com/opencast/opencast/commit/bbb473f34ab95497d6c432c81285efb0c739f317"}]},"source":{"advisory":"GHSA-w29m-fjp4-qhmq","discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2020-01-30 21:15:00","lastModifiedDate":"2020-02-10 21:55:00","problem_types":["CWE-74"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":5},"severity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apereo:opencast:8.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apereo:opencast:*:*:*:*:*:*:*:*","versionEndExcluding":"7.6","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2020","CveId":"5230","Ordinal":"165444","Title":"CVE-2020-5230","CVE":"CVE-2020-5230","Year":"2020"},"notes":[{"CveYear":"2020","CveId":"5230","Ordinal":"1","NoteData":"Opencast before 8.1 and 7.6 allows almost arbitrary identifiers for media packages and elements to be used. This can be problematic for operation and security since such identifiers are sometimes used for file system operations which may lead to an attacker being able to escape working directories and write files to other locations. In addition, Opencast's Id.toString(…) vs Id.compact(…) behavior, the latter trying to mitigate some of the file system problems, can cause errors due to identifier mismatch since an identifier may unintentionally change. This issue is fixed in Opencast 7.6 and 8.1.","Type":"Description","Title":null},{"CveYear":"2020","CveId":"5230","Ordinal":"2","NoteData":"2020-01-30","Type":"Other","Title":"Published"},{"CveYear":"2020","CveId":"5230","Ordinal":"3","NoteData":"2020-01-30","Type":"Other","Title":"Modified"}]}}}