Hello,
this is the official security notice regarding a security issue
recently discovered in Opencast versions 4.0-4.4 and 5.0.
Tracked as:
CVE-2018-16155
Description:
Using the ingest endpoints, access to ingested events may have been
set to be public if no access control list was provided.
Affects:
This issue affects Opencast versions 4.0-4.4, and 5.0.
Details:
Opencast 4 announced that the default access control list had been
changed to one allowing access to organizational or global
administrators only:
https://docs.opencast.org/r/4.x/admin/releasenotes/#access-control-defaults
However, the ingest service could in some cases have overwritten this
by applying an explicit public access control list during ingest if
no access control list was associated with the event.
Note that if an event is created via the administrative user
interface, it will have an attached access control list, even if the
ingest service is used (e.g. scheduled events). Hence, the problem
is most likely to occur on ad-hoc recordings ingested by external
systems.
Patching the system:
Patches for this issue will be included in Opencast 4.5, and 5.1.
Credits:
This issue was discovered by Dieter Piesch (Universitaet Regensburg)
and fixed by Julian Kniephoff (ELAN e.V.)
Links:
-
https://opencast.jira.com/browse/MH-13055
-
https://github.com/opencast/opencast/pull/396
-
https://github.com/opencast/opencast/pull/397