Miggo Logo

CVE-2020-5231: Users with ROLE_COURSE_ADMIN can create new users in Opencast

4.8

CVSS Score
3.1

Basic Information

EPSS Score
0.45769%
Published
1/30/2020
Updated
1/9/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.opencastproject:opencast-kernelmaven< 7.67.6
org.opencastproject:opencast-kernelmaven>= 8.0, < 8.18.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from misconfigured security authorization rules in the XML configuration file (mh_default_org.xml), not from specific code functions. The security configuration erroneously granted ROLE_COURSE_ADMIN access to administrative endpoints like /user-utils/** via intercept-url patterns. The fix involved removing ROLE_COURSE_ADMIN from these patterns. While the user-utils endpoint's handler (e.g., a PUT request handler) is the exploited entry point, the root cause is the security configuration, not a flaw in the handler's code logic. No specific code functions are identified as vulnerable with high confidence from the provided data.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t Us*rs wit* t** rol* `ROL*_*OURS*_**MIN` **n us* t** us*r-utils *n*point to *r**t* n*w us*rs not in*lu*in* t** rol* `ROL*_**MIN`. *or *x*mpl*: ```**s* # Us* t** **min to *r**t* * n*w us*r wit* ROL*_*OURS*_**MIN usin* t** **min us*r. # W*

Reasoning

T** vuln*r**ility st*ms *rom mis*on*i*ur** s**urity *ut*oriz*tion rul*s in t** XML *on*i*ur*tion *il* (m*_****ult_or*.xml), not *rom sp**i*i* *o** *un*tions. T** s**urity *on*i*ur*tion *rron*ously *r*nt** ROL*_*OURS*_**MIN ****ss to **ministr*tiv* *n