Miggo Logo

CVE-2020-5206: Authentication Bypass For Endpoints With Anonymous Access in Opencast

8.7

CVSS Score
3.1

Basic Information

EPSS Score
0.52492%
Published
1/30/2020
Updated
1/9/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.opencastproject:opencast-kernelmaven< 7.67.6
org.opencastproject:opencast-kernelmaven>= 8.0, < 8.18.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper order of authentication checks in the getUser() method. The patched commit (b157e1f) adds an early check for AnonymousAuthenticationToken, indicating the original code processed remember-me cookies even when anonymous access was allowed. The vulnerable function handles authentication state by first checking delegated users, then falling back to security context without proper anonymous access validation, enabling the bypass scenario described in the advisory.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t Usin* * r*m*m**r-m* *ooki* wit* *n *r*itr*ry us*rn*m* **n **us* Op*n**st to *ssum* prop*r *ut**nti**tion *or t**t us*r *v*n i* t** r*m*m**r-m* *ooki* w*s in*orr**t *iv*n t**t t** *tt**k** *n*point *lso *llows *nonymous ****ss. T*is w*y,

Reasoning

T** vuln*r**ility st*ms *rom improp*r or**r o* *ut**nti**tion ****ks in t** `**tUs*r()` m*t*o*. T** p*t**** *ommit (*******) ***s *n **rly ****k *or `*nonymous*ut**nti**tionTok*n`, in*i**tin* t** ori*in*l *o** pro**ss** r*m*m**r-m* *ooki*s *v*n w**n