GHSA-r3qr-vwvg-43f7

Source
https://github.com/advisories/GHSA-r3qr-vwvg-43f7
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/11/GHSA-r3qr-vwvg-43f7/GHSA-r3qr-vwvg-43f7.json
Aliases
Published
2022-11-30T21:22:23Z
Modified
2023-11-08T04:10:37.038314Z
Details

Description Prior to Opencast 12.5 Opencast's Paella authentication page could be used to redirect to an arbitrary URL for authenticated users.

Impact The vulnerability allows attackers to redirect users to sites outside of your Opencast install, potentially facilitating phishing attacks or other security issues.

Patches This issue is fixed in Opencast 12.5 and newer

References Patch fixing the issue

If you have any questions or comments about this advisory: Open an issue in our issue tracker Email us at security@opencast.org

References

Affected packages

Maven / org.opencastproject:opencast-common

Package

Name
org.opencastproject:opencast-common

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0The exact introduced commit is unknown
Fixed
12.5

Affected versions

6.*

6.6

7.*

7.2
7.3
7.4
7.5
7.6
7.7
7.8
7.9

8.*

8.0
8.1
8.3
8.4
8.5
8.6
8.7
8.8
8.9
8.10
8.11

9.*

9.0
9.1
9.2
9.3
9.4
9.5
9.6
9.7
9.9
9.10
9.11
9.12

10.*

10.0
10.1
10.2
10.3
10.4
10.5
10.6
10.7
10.8
10.9
10.10
10.11
10.12

11.*

11.0
11.1
11.2
11.3
11.4
11.5
11.6
11.7
11.8
11.9
11.10
11.11

12.*

12.0
12.1
12.2
12.3