Opencast is a free and open source solution for automated video capture and distribution. Versions of Opencast prior to 9.6 are vulnerable to the billion laughs attack, which allows an attacker to easily execute a (seemingly permanent) denial of service attack, essentially taking down Opencast using a single HTTP request. To exploit this, users need to have ingest privileges, limiting the group of potential attackers The problem has been fixed in Opencast 9.6. There is no known workaround for this issue.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-1301 Opencast is a free and open source solution for automated video capture and distribution. Versions of Opencast prior to 9.6 are vulnerable to the billion laughs attack, which allows an attacker to easily execute a (seemingly permanent) denial of service attack, essentially taking down Opencast using a single HTTP request. To exploit this, users need to have ingest privileges, limiting the group of potential attackers The problem has been fixed in Opencast 9.6. There is no known workaround for this issue.
Github GHSA Github GHSA GHSA-9gwx-9cwp-5c2m Billion laughs attack (XML bomb)
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-03T23:25:30.875Z

Reserved: 2021-05-12T00:00:00

Link: CVE-2021-32623

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-06-16T00:15:07.717

Modified: 2024-11-21T06:07:24.060

Link: CVE-2021-32623

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.