Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.opencastproject/opencast-kernel
  4. ›
  5. CVE-2022-41965

CVE-2022-41965: URL Redirection to Untrusted Site ('Open Redirect')

November 28, 2022 (updated December 1, 2022)

Opencast is a free, open-source platform to support the management of educational audio and video content. Prior to Opencast 12.5, Opencast’s Paella authentication page could be used to redirect to an arbitrary URL for authenticated users. The vulnerability allows attackers to redirect users to sites outside of one’s Opencast install, potentially facilitating phishing attacks or other security issues. This issue is fixed in Opencast 12.5 and newer.

References

  • github.com/opencast/opencast/commit/d2ce2321590f86b066a67e8c231cf68219aea017
  • github.com/opencast/opencast/security/advisories/GHSA-r3qr-vwvg-43f7
  • nvd.nist.gov/vuln/detail/CVE-2022-41965

Code Behaviors & Features

Detect and mitigate CVE-2022-41965 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 12.5

Fixed versions

  • 12.5

Solution

Upgrade to version 12.5 or above.

Impact 6.1 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-601: URL Redirection to Untrusted Site ('Open Redirect')

Source file

maven/org.opencastproject/opencast-kernel/CVE-2022-41965.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:07 +0000.