Get a Pentest and security assessment of your IT network.

2021-current

CVE-2020-26234 – Opencast before versions 8.9 and 7.9 disables HTTPS hostname verification

Opencast before versions 8.9 and 7.9 disables HTTPS hostname verification of its HTTP client used for a large portion of Opencast’s HTTP requests. Hostname verification is an important part when using HTTPS to ensure that the presented certificate is valid for the host. Disabling it can allow for man-in-the-middle attacks. This problem is fixed in Opencast 7.9 and Opencast 8.8 Please be aware that fixing the problem means that Opencast will not simply accept any self-signed certificates any longer without properly importing them. If you need those, please make sure to import them into the Java key store. Better yet, get a valid certificate.

 

Source: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26234

Reference (s):

  • https://github.com/opencast/opencast/security/advisories/GHSA-44cw-p2hm-gpf6
  • URL: https://github.com/opencast/opencast/security/advisories/GHSA-44cw-p2hm-gpf6
  • https://github.com/opencast/opencast/commit/4225bf90af74557deaf8fb6b80b0705c9621acfc
  • URL: https://github.com/opencast/opencast/commit/4225bf90af74557deaf8fb6b80b0705c9621acfc
Related posts
2021-current

CVE-2004-1715 - Directory traversal vulnerability in MIMEsweeper for Web before 5.0.4 all

2021-current

CVE-2014-8508 - Cross-site scripting (XSS) vulnerability in s_network.asp in the Denon AV

2021-current

CVE-2020-0297 - In devicepolicy service, there is a possible permission bypass due to an

2021-current

CVE-2020-14315 - A memory corruption vulnerability is present in bspatch as shipped in Col