| |
Vulnerability CVE-2021-32623
Published: 2021-06-16
Description: |
Opencast is a free and open source solution for automated video capture and distribution. Versions of Opencast prior to 9.6 are vulnerable to the billion laughs attack, which allows an attacker to easily execute a (seemingly permanent) denial of service attack, essentially taking down Opencast using a single HTTP request. To exploit this, users need to have ingest privileges, limiting the group of potential attackers The problem has been fixed in Opencast 9.6. There is no known workaround for this issue. |
Type:
CWE-776
CVSS2 => (AV:N/AC:L/Au:S/C:N/I:N/A:P)
CVSS Base Score |
Impact Subscore |
Exploitability Subscore |
4/10 |
2.9/10 |
8/10 |
Exploit range |
Attack complexity |
Authentication |
Remote |
Low |
Single time |
Confidentiality impact |
Integrity impact |
Availability impact |
None |
None |
Partial |
References: |
https://github.com/opencast/opencast/commit/8ae27da5a6f658011a5741b3210e715b0dc6213e
https://github.com/opencast/opencast/security/advisories/GHSA-9gwx-9cwp-5c2m
|
|
|
closedb();
?>
Copyright 2024, cxsecurity.com
|
|
|