CVE-2021-43807 – HTTP Method Spoofing in Opencast
https://notcve.org/view.php?id=CVE-2021-43807
Opencast is an Open Source Lecture Capture & Video Management for Education. Opencast versions prior to 9.10 allow HTTP method spoofing, allowing to change the assumed HTTP method via URL parameter. This allows attackers to turn HTTP GET requests into PUT requests or an HTTP form to send DELETE requests. This bypasses restrictions otherwise put on these types of requests and aids in cross-site request forgery (CSRF) attacks, which would otherwise not be possible. The vulnerability allows attackers to craft links or forms which may change the server state. • https://github.com/opencast/opencast/commit/59cb6731067283e54f15462be38b6117d8b9ea8b#diff-9c5fb3d1b7e3b0f54bc5c4182965c4fe1f9023d449017cece3005d3f90e8e4d8 https://github.com/opencast/opencast/commit/8f8271e1085f6f8e306c689d6a56b0bb8d076444 https://github.com/opencast/opencast/security/advisories/GHSA-j4mm-7pj3-jf7v • CWE-290: Authentication Bypass by Spoofing •
CVE-2021-42567
https://notcve.org/view.php?id=CVE-2021-42567
Apereo CAS through 6.4.1 allows XSS via POST requests sent to the REST API endpoints. Apereo CAS versiones hasta 6.4.1, permite un ataque de tipo XSS por medio de peticiones POST enviadas a los endpoints de la API REST • https://apereo.github.io/2021/10/18/restvuln https://github.com/apereo/cas/releases • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2021-32623 – Opencast vulnerable to billion laughs attack (XML bomb)
https://notcve.org/view.php?id=CVE-2021-32623
Opencast is a free and open source solution for automated video capture and distribution. Versions of Opencast prior to 9.6 are vulnerable to the billion laughs attack, which allows an attacker to easily execute a (seemingly permanent) denial of service attack, essentially taking down Opencast using a single HTTP request. To exploit this, users need to have ingest privileges, limiting the group of potential attackers The problem has been fixed in Opencast 9.6. There is no known workaround for this issue. Opencast es una solución gratuita y de código abierto para la captura y distribución automática de vídeo. • https://github.com/opencast/opencast/commit/8ae27da5a6f658011a5741b3210e715b0dc6213e https://github.com/opencast/opencast/security/advisories/GHSA-9gwx-9cwp-5c2m • CWE-776: Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion') •
CVE-2021-21318 – Removing access may not effect published series
https://notcve.org/view.php?id=CVE-2021-21318
Opencast is a free, open-source platform to support the management of educational audio and video content. In Opencast before version 9.2 there is a vulnerability in which publishing an episode with strict access rules will overwrite the currently set series access. This allows for an easy denial of access for all users without superuser privileges, effectively hiding the series. Access to series and series metadata on the search service (shown in media module and player) depends on the events published which are part of the series. Publishing an event will automatically publish a series and update access to it. • https://github.com/opencast/opencast/commit/b18c6a7f81f08ed14884592a6c14c9ab611ad450 https://github.com/opencast/opencast/security/advisories/GHSA-vpc2-3wcv-qj4w • CWE-863: Incorrect Authorization •
CVE-2020-26234 – Disabled Hostname Verification in OpenCast
https://notcve.org/view.php?id=CVE-2020-26234
Opencast before versions 8.9 and 7.9 disables HTTPS hostname verification of its HTTP client used for a large portion of Opencast's HTTP requests. Hostname verification is an important part when using HTTPS to ensure that the presented certificate is valid for the host. Disabling it can allow for man-in-the-middle attacks. This problem is fixed in Opencast 7.9 and Opencast 8.8 Please be aware that fixing the problem means that Opencast will not simply accept any self-signed certificates any longer without properly importing them. If you need those, please make sure to import them into the Java key store. • https://github.com/opencast/opencast/commit/4225bf90af74557deaf8fb6b80b0705c9621acfc https://github.com/opencast/opencast/security/advisories/GHSA-44cw-p2hm-gpf6 • CWE-346: Origin Validation Error •