GHSA-mh8g-hprg-8363

Suggest an improvement
Source
https://github.com/advisories/GHSA-mh8g-hprg-8363
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/01/GHSA-mh8g-hprg-8363/GHSA-mh8g-hprg-8363.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-mh8g-hprg-8363
Aliases
Published
2020-01-30T21:21:44Z
Modified
2023-11-08T04:03:51.678642Z
Severity
  • 6.8 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N CVSS Calculator
Summary
Hard-Coded Key Used For Remember-me Token in Opencast
Details

Impact

The security configuration in etc/security/mh_default_org.xml enables a remember-me cookie based on a hash created from the username, password, and an additional system key. Opencast has hard-coded this system key in the large XML file and never mentions to change this, basically ensuring that all systems use the same key:

<sec:remember-me key="opencast" user-service-ref="userDetailsService" />

This means that an attacker getting access to a remember-me token for one server can get access to all servers which allow log-in using the same credentials without ever needing the credentials. For example, a remember-me token obtained from develop.opencast.org can be used on stable.opencast.org without actually knowing the log-in credentials.

Such an attack will usually not work on different installations – assuming that safe, unique passwords are used – but it is basically guaranteed to work to get access to all machines of one cluster if a token from one machine is compromised.

Patches

This problem is fixed in Opencast 7.6 and Opencast 8.1

Workarounds

We strongly recommend updating to the patched version. Still, as a workaround for older versions, in etc/security/mh_default_org.xml, set a custom key for each server:

<sec:remember-me key="CUSTOM_RANDOM_KEY" user-service-ref="userDetailsService" />

References

For more information

If you have any questions or comments about this advisory: - Open an issue in opencast/opencast - For security-relevant information, email us at security@opencast.org

Thanks

Thanks to @LukasKalbertodt for reporting the issue.

Database specific
{
    "nvd_published_at": null,
    "github_reviewed_at": "2020-01-30T20:48:17Z",
    "severity": "MODERATE",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-798"
    ]
}
References

Affected packages

Maven / org.opencastproject:opencast-kernel

Package

Name
org.opencastproject:opencast-kernel
View open source insights on deps.dev
Purl
pkg:maven/org.opencastproject/opencast-kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.6

Affected versions

6.*

6.6

7.*

7.2
7.3
7.4
7.5

Maven / org.opencastproject:opencast-kernel

Package

Name
org.opencastproject:opencast-kernel
View open source insights on deps.dev
Purl
pkg:maven/org.opencastproject/opencast-kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
8.0
Fixed
8.1

Affected versions

8.*

8.0