CVE-2022-41965

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-41965
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-41965.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-41965
Aliases
Published
2022-11-28T21:15:10Z
Modified
2024-05-14T12:20:26.274245Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

Opencast is a free, open-source platform to support the management of educational audio and video content. Prior to Opencast 12.5, Opencast's Paella authentication page could be used to redirect to an arbitrary URL for authenticated users. The vulnerability allows attackers to redirect users to sites outside of one's Opencast install, potentially facilitating phishing attacks or other security issues. This issue is fixed in Opencast 12.5 and newer.

References

Affected packages

Git / github.com/opencast/opencast

Affected ranges

Type
GIT
Repo
https://github.com/opencast/opencast
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

1.*

1.4.0
1.4.1
1.4.2
1.4.2-rc2
1.4.3
1.4.4
1.4.4-rc1
1.5.0
1.5.0-rc1
1.5.0-rc2
1.5.0-rc3
1.5.0-rc4
1.5.0-rc5
1.5.0-rc6
1.5.0-rc7
1.5.1
1.6.0
1.6.0-RC1
1.6.0-beta1
1.6.0-beta2
1.6.0-beta3
1.6.0-beta4
1.6.1-RC1

2.*

2.0.0-beta1
2.0.0-beta2