Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLW1oOGctaHByZy04MzYz
Hard-Coded Key Used For Remember-me Token in Opencast
Impact
The security configuration in etc/security/mh_default_org.xml
enables a remember-me cookie based on a hash created from the username, password, and an additional system key. Opencast has hard-coded this system key in the large XML file and never mentions to change this, basically ensuring that all systems use the same key:
<sec:remember-me key="opencast" user-service-ref="userDetailsService" />
This means that an attacker getting access to a remember-me token for one server can get access to all servers which allow log-in using the same credentials without ever needing the credentials. For example, a remember-me token obtained from develop.opencast.org can be used on stable.opencast.org without actually knowing the log-in credentials.
Such an attack will usually not work on different installations – assuming that safe, unique passwords are used – but it is basically guaranteed to work to get access to all machines of one cluster if a token from one machine is compromised.
Patches
This problem is fixed in Opencast 7.6 and Opencast 8.1
Workarounds
We strongly recommend updating to the patched version. Still, as a workaround for older versions, in etc/security/mh_default_org.xml
, set a custom key for each server:
<sec:remember-me key="CUSTOM_RANDOM_KEY" user-service-ref="userDetailsService" />
References
- Relevant lines in the security configuration
- Spring Security Remember-Me Authentication Documentation
For more information
If you have any questions or comments about this advisory:
- Open an issue in opencast/opencast
- For security-relevant information, email us at [email protected]
Thanks
Thanks to @LukasKalbertodt for reporting the issue.
Permalink: https://github.com/advisories/GHSA-mh8g-hprg-8363JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLW1oOGctaHByZy04MzYz
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: almost 5 years ago
Updated: almost 2 years ago
CVSS Score: 6.8
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N
Identifiers: GHSA-mh8g-hprg-8363, CVE-2020-5222
References:
- https://github.com/opencast/opencast/security/advisories/GHSA-mh8g-hprg-8363
- https://github.com/opencast/opencast/commit/1a7172c95af8d542a77ae5b153e4c834dd4788a6
- https://nvd.nist.gov/vuln/detail/CVE-2020-5222
- https://github.com/advisories/GHSA-mh8g-hprg-8363
Blast Radius: 10.4
Affected Packages
maven:org.opencastproject:opencast-kernel
Dependent packages: 19Dependent repositories: 34
Downloads:
Affected Version Ranges: >= 8.0, < 8.1, < 7.6
Fixed in: 8.1, 7.6
All affected versions:
All unaffected versions: