Miggo Logo

CVE-2020-5228: Unauthenticated Access Via OAI-PMH

7.6

CVSS Score
3.1

Basic Information

EPSS Score
0.55916%
Published
1/30/2020
Updated
1/9/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.opencastproject:opencast-oaipmh-apimaven< 7.67.6
org.opencastproject:opencast-oaipmh-apimaven>= 8.0, < 8.18.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from Spring Security configurations allowing unauthenticated access to /oaipmh endpoints. While no Java code changes were shown in the provided patches, the OaiPmhServlet (or equivalent request handler) would be the entry point processing these requests. The security configuration change from ROLE_ANONYMOUS to ROLE_ADMIN in mh_default_org.xml indicates that the corresponding request handler was previously executable without authentication, making it the vulnerable component observable in runtime profiles when exploited.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t M**i* pu*li**tion vi* O*I-PM* *llows un*ut**nti**t** pu*li* ****ss to *ll m**i* *n* m*t***t* *y ****ult. O*I-PM* is p*rt o* t** ****ult work*low *n* is **tiv*t** *y ****ult, r*quirin* **tiv* us*r int*rv*ntion o* us*rs to prot**t m**i*. T*

Reasoning

T** vuln*r**ility st*mm** *rom Sprin* S**urity *on*i*ur*tions *llowin* un*ut**nti**t** ****ss to /o*ipm* *n*points. W*il* no J*v* *o** ***n**s w*r* s*own in t** provi*** p*t***s, t** O*iPm*S*rvl*t (or *quiv*l*nt r*qu*st **n*l*r) woul* ** t** *ntry po