Miggo Logo

CVE-2022-29237: Limited Authentication Bypass for Media Files

5.4

CVSS Score
3.1

Basic Information

EPSS Score
0.34765%
Published
5/25/2022
Updated
1/27/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.opencastproject:opencast-ingest-service-implmaven< 10.1410.14
org.opencastproject:opencast-ingest-service-implmaven>= 11.0, < 11.711.7

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from how cluster URLs were validated in addContentToRepo. The pre-patch code used organizationDirectoryService.getOrganization(uri.toURL()) to determine allowed servers, which checks the organization associated with the input URI rather than the current user's organization. This allowed attackers to reference resources from other organizations. The patch replaced this with securityService.getOrganization(), which properly validates against the current user's organizational context. The function's role in media ingestion and the direct modification in the security fix confirm its vulnerability.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

Prior to Op*n**st **.** *n* **.*, us*rs *oul* p*ss *lon* URLs *or *il*s **lon*in* to or**niz*tions ot**r t**n t** us*r's own, w*i** Op*n**st woul* t**n import into t** *urr*nt or**niz*tion, *yp*ssin* or**niz*tion*l **rri*rs. ### Imp**t T** vuln*r**

Reasoning

T** vuln*r**ility st*ms *rom *ow *lust*r URLs w*r* v*li**t** in `****ont*ntToR*po`. T** pr*-p*t** *o** us** `or**niz*tion*ir**toryS*rvi**.**tOr**niz*tion(uri.toURL())` to **t*rmin* *llow** s*rv*rs, w*i** ****ks t** or**niz*tion *sso*i*t** wit* t** in