Vulnerability Details : CVE-2020-5230
Opencast before 8.1 and 7.6 allows almost arbitrary identifiers for media packages and elements to be used. This can be problematic for operation and security since such identifiers are sometimes used for file system operations which may lead to an attacker being able to escape working directories and write files to other locations. In addition, Opencast's Id.toString(…) vs Id.compact(…) behavior, the latter trying to mitigate some of the file system problems, can cause errors due to identifier mismatch since an identifier may unintentionally change. This issue is fixed in Opencast 7.6 and 8.1.
Products affected by CVE-2020-5230
- cpe:2.3:a:apereo:opencast:*:*:*:*:*:*:*:*
- cpe:2.3:a:apereo:opencast:8.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-5230
0.33%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 55 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-5230
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:N |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
3.9
|
3.6
|
NIST | |
7.7
|
HIGH | CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N |
1.3
|
5.8
|
GitHub, Inc. |
CWE ids for CVE-2020-5230
-
The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.Assigned by: nvd@nist.gov (Primary)
-
The product receives input from an upstream component, but it does not restrict or incorrectly restricts the input before it is used as an identifier for a resource that may be outside the intended sphere of control.Assigned by: security-advisories@github.com (Secondary)
References for CVE-2020-5230
-
https://github.com/opencast/opencast/commit/bbb473f34ab95497d6c432c81285efb0c739f317
Limit Characters Allowed In Ids · opencast/opencast@bbb473f · GitHubPatch
-
https://github.com/opencast/opencast/security/advisories/GHSA-w29m-fjp4-qhmq
Unsafe Identifiers · Advisory · opencast/opencast · GitHubThird Party Advisory
Jump to