Описание
Opencast before 7.6 and 8.1 enables a remember-me cookie based on a hash created from the username, password, and an additional system key. This means that an attacker getting access to a remember-me token for one server can get access to all servers which allow log-in using the same credentials without ever needing the credentials. This problem is fixed in Opencast 7.6 and Opencast 8.1
Ссылки
- Patch
- MitigationThird Party Advisory
- Patch
- MitigationThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 7.6 (исключая)
Одно из
cpe:2.3:a:apereo:opencast:*:*:*:*:*:*:*:*
cpe:2.3:a:apereo:opencast:8.0:*:*:*:*:*:*:*
EPSS
Процентиль: 49%
0.0026
Низкий
6.8 Medium
CVSS3
8.8 High
CVSS3
6.5 Medium
CVSS2
Дефекты
CWE-798
CWE-798
Связанные уязвимости
CVSS3: 6.8
github
около 6 лет назад
Hard-Coded Key Used For Remember-me Token in Opencast
EPSS
Процентиль: 49%
0.0026
Низкий
6.8 Medium
CVSS3
8.8 High
CVSS3
6.5 Medium
CVSS2
Дефекты
CWE-798
CWE-798