CVE-2021-32623

Opencast is a free and open source solution for automated video capture and distribution. Versions of Opencast prior to 9.6 are vulnerable to the billion laughs attack, which allows an attacker to easily execute a (seemingly permanent) denial of service attack, essentially taking down Opencast using a single HTTP request. To exploit this, users need to have ingest privileges, limiting the group of potential attackers The problem has been fixed in Opencast 9.6. There is no known workaround for this issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:apereo:opencast:*:*:*:*:*:*:*:*

History

23 Jun 2021, 19:55

Type Values Removed Values Added
References (MISC) https://github.com/opencast/opencast/commit/8ae27da5a6f658011a5741b3210e715b0dc6213e - (MISC) https://github.com/opencast/opencast/commit/8ae27da5a6f658011a5741b3210e715b0dc6213e - Patch, Third Party Advisory
References (CONFIRM) https://github.com/opencast/opencast/security/advisories/GHSA-9gwx-9cwp-5c2m - (CONFIRM) https://github.com/opencast/opencast/security/advisories/GHSA-9gwx-9cwp-5c2m - Exploit, Third Party Advisory
CPE cpe:2.3:a:apereo:opencast:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 4.0
v3 : 6.5
CWE CWE-776

16 Jun 2021, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-06-16 00:15

Updated : 2023-12-10 13:55


NVD link : CVE-2021-32623

Mitre link : CVE-2021-32623

CVE.ORG link : CVE-2021-32623


JSON object : View

Products Affected

apereo

  • opencast
CWE
CWE-776

Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')