CVE-2020-5222: Hard-Coded Key Used For Remember-me Token in Opencast
6.8
Basic Information
Technical Details
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.opencastproject:opencast-kernel | maven | < 7.6 | 7.6 |
org.opencastproject:opencast-kernel | maven | >= 8.0, < 8.1 | 8.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from a hard-coded 'key' value in the Spring Security configuration file (etc/security/mh_default_org.xml), not from a specific code function. The XML configuration line <sec:remember-me key="opencast" ... />
statically defines the cryptographic key used for remember-me token generation. This key is shared across all installations, making tokens portable between systems. While the fix introduces a custom class (SystemTokenBasedRememberMeService) to dynamically generate the key, the vulnerability itself resides in the configuration setup rather than a specific code function. The original implementation used Spring's default TokenBasedRememberMeService with a static key, but this is part of the framework, not Opencast's code. Thus, no Opencast code functions are directly implicated with high confidence.