Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-hq8m-v68g-8cf8

Опубликовано: 29 авг. 2025
Источник: github
Github: Прошло ревью
CVSS4: 2.7

Описание

Opencast has a partial path traversal vulnerability in UI config

The protections against path traversal attacks in the UI config module are insufficient, still partially allowing for attacks in very specific cases.

The path is checked without checking for the file separator. This could allow attackers access to files within another folder which starts with the same path. For example, the default UI config directory is placed at /etc/opencast/ui-config. Without this patch, an attacker can get access to files in a folder /etc/opencast/ui-config-hidden if those files are readable by Opencast.

General path traversal is not possible. For example, an attacker cannot exploit this to access files in /etc/opencast/encoding or even in /etc/opencast/ directly.

How dangerous is this?

Theoretically, this vulnerability may be exploited to get access to some non-public files. However, given the default structure of Opencast's configuration, this is extremely unlikely to hit any users. There can be but one ui-config folders. This makes it quite unlikely for any user to have created an additional folder starting with ui-config. Users could also rename this folder, but since there is no real reason for anyone to do this, this, again is extremely unlikely to trigger this issue.

How to fix the issue

Пакеты

Наименование

org.opencastproject:opencast-user-interface-configuration

maven
Затронутые версииВерсия исправления

< 17.7

17.7

Наименование

org.opencastproject:opencast-user-interface-configuration

maven
Затронутые версииВерсия исправления

= 18.0

18.1

EPSS

Процентиль: 21%
0.00067
Низкий

2.7 Low

CVSS4

Дефекты

CWE-23

Связанные уязвимости

CVSS3: 5.3
nvd
5 месяцев назад

Opencast is a free, open-source platform to support the management of educational audio and video content. In version 18.0 and versions before 17.7, the protections against path traversal attacks in the UI config module are insufficient, still partially allowing for attacks in very specific cases. The path is checked without checking for the file separator. This could allow attackers access to files within another folder which starts with the same path. This issue has been fixed in versions 17.7 and 18.1. To mitigate this issue, check for folders that start with the same path as the ui-config folder.

EPSS

Процентиль: 21%
0.00067
Низкий

2.7 Low

CVSS4

Дефекты

CWE-23