CVE-2020-5206: Authentication Bypass For Endpoints With Anonymous Access in Opencast
8.7
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.52492%
CWE
Published
1/30/2020
Updated
1/9/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.opencastproject:opencast-kernel | maven | < 7.6 | 7.6 |
org.opencastproject:opencast-kernel | maven | >= 8.0, < 8.1 | 8.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper order of authentication checks in the getUser()
method. The patched commit (b157e1f) adds an early check for AnonymousAuthenticationToken
, indicating the original code processed remember-me cookies even when anonymous access was allowed. The vulnerable function
handles authentication state by first checking delegated users, then falling back to security context without proper anonymous access validation, enabling the bypass scenario described in the advisory.