CVE-2021-43807

Published: Dic 14, 2021 Last Modified: Nov 21, 2024 EU-VD ID: EUVD-2021-2538 Aliases: GHSA-j4mm-7pj3-jf7v
ExploitDB:
Other exploit source:
Google Dorks:
HIGH 7,5
Attack Vector: network
Attack Complexity: high
Privileges Required: none
User Interaction: required
Scope: unchanged
Confidentiality: high
Integrity: high
Availability: high
MEDIUM 4,3
Access Vector: network
Access Complexity: medium
Authentication: none
Confidentiality: none
Integrity: partial
Availability: none

Description

AI Translation Available

Opencast is an Open Source Lecture Capture & Video Management for Education. Opencast versions prior to 9.10 allow HTTP method spoofing, allowing to change the assumed HTTP method via URL parameter. This allows attackers to turn HTTP GET requests into PUT requests or an HTTP form to send DELETE requests. This bypasses restrictions otherwise put on these types of requests and aids in cross-site request forgery (CSRF) attacks, which would otherwise not be possible. The vulnerability allows attackers to craft links or forms which may change the server state. This issue is fixed in Opencast 9.10 and 10.0. You can mitigate the problem by setting the `SameSite=Strict` attribute for your cookies. If this is a viable option for you depends on your integrations. We strongly recommend updating in any case.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0039
Percentile
0,6th
Updated

EPSS Score Trend (Last 90 Days)

290

Authentication Bypass by Spoofing

Incomplete
Common Consequences
Security Scopes Affected:
Access Control
Potential Impacts:
Bypass Protection Mechanism Gain Privileges Or Assume Identity
Applicable Platforms
All platforms may be affected
View CWE Details
Application

Opencast by Apereo

Version Range Affected
To 9.10 (exclusive)
cpe:2.3:a:apereo:opencast:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://github.com/opencast/opencast/commit/59cb6731067283e54f15462be38b6117d8b…
https://github.com/opencast/opencast/commit/8f8271e1085f6f8e306c689d6a56b0bb8d0…
https://github.com/opencast/opencast/security/advisories/GHSA-j4mm-7pj3-jf7v
https://github.com/opencast/opencast/commit/59cb6731067283e54f15462be38b6117d8b…
https://github.com/opencast/opencast/commit/8f8271e1085f6f8e306c689d6a56b0bb8d0…
https://github.com/opencast/opencast/security/advisories/GHSA-j4mm-7pj3-jf7v