An open API service providing security vulnerability metadata for many open source software ecosystems.

GSA_kwCzR0hTQS1qNjNoLWhtZ3cteDRqN84ABKiM

Moderate EPSS: 0.00022% (0.04111 Percentile) EPSS:

Opencast still publishes global system account credentials

Affected Packages Affected Versions Fixed Versions
maven:org.opencastproject:opencast-publication-service-oaipmh-remote < 17.6 17.6
0 Dependent packages
0 Dependent repositories

Affected Version Ranges

All affected versions

All unaffected versions

maven:org.opencastproject:opencast-kernel < 17.6 17.6
19 Dependent packages
34 Dependent repositories

Affected Version Ranges

All affected versions

All unaffected versions

maven:org.opencastproject:opencast-ingest-service-impl < 17.6 17.6
0 Dependent packages
0 Dependent repositories

Affected Version Ranges

All affected versions

All unaffected versions

maven:org.opencastproject:opencast-common < 17.6 17.6
243 Dependent packages
37 Dependent repositories

Affected Version Ranges

All affected versions

All unaffected versions

Description

Opencast prior to versions 17.6 would incorrectly send the hashed global system account credentials (ie: org.opencastproject.security.digest.user and org.opencastproject.security.digest.pass) when attempting to fetch mediapackage elements included in a mediapackage XML file. A previous CVE prevented many cases where the credentials were inappropriately sent, but not all. The remainder are addressed with this patch.

Impact

Anyone with ingest permissions could cause Opencast to send its hashed global system account credentials to a url of their choosing.

Patches

This issue is fixed in Opencast 17.6

If you have any questions or comments about this advisory:

References: