Description
Opencast is a free, open-source platform to support the management of educational audio and video content. Prior to Opencast 12.5, Opencast's Paella authentication page could be used to redirect to an arbitrary URL for authenticated users. The vulnerability allows attackers to redirect users to sites outside of one's Opencast install, potentially facilitating phishing attacks or other security issues. This issue is fixed in Opencast 12.5 and newer.
Remediation
References
https://github.com/opencast/opencast/commit/d2ce2321590f86b066a67e8c231cf68219aea017
https://github.com/opencast/opencast/security/advisories/GHSA-r3qr-vwvg-43f7
Related Vulnerabilities
CVE-2020-15250 Vulnerability in maven package junit:junit
CVE-2020-28270 Vulnerability in npm package object-hierarchy-access
CVE-2022-21169 Vulnerability in npm package express-xss-sanitizer
CVE-2021-21347 Vulnerability in maven package com.thoughtworks.xstream:xstream
CVE-2023-36478 Vulnerability in maven package org.eclipse.jetty.http3:http3-qpack