CVE-2020-5231: Users with ROLE_COURSE_ADMIN can create new users in Opencast
4.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.45769%
CWE
Published
1/30/2020
Updated
1/9/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.opencastproject:opencast-kernel | maven | < 7.6 | 7.6 |
org.opencastproject:opencast-kernel | maven | >= 8.0, < 8.1 | 8.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from misconfigured security authorization rules in the XML configuration file (mh_default_org.xml), not from specific code functions. The security configuration erroneously granted ROLE_COURSE_ADMIN access to administrative endpoints like /user-utils/** via intercept-url patterns. The fix involved removing ROLE_COURSE_ADMIN from these patterns. While the user-utils endpoint's handler (e.g., a PUT request handler) is the exploited entry point, the root cause is the security configuration, not a flaw in the handler's code logic. No specific code functions are identified as vulnerable with high confidence from the provided data.