CVE-2022-41965

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-41965
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-41965.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-41965
Aliases
Published
2022-11-28T00:00:00Z
Modified
2025-10-30T19:31:43Z
Severity
  • 5.7 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N CVSS Calculator
Summary
Opencast Authenticated OpenRedirect Vulnerability
Details

Opencast is a free, open-source platform to support the management of educational audio and video content. Prior to Opencast 12.5, Opencast's Paella authentication page could be used to redirect to an arbitrary URL for authenticated users. The vulnerability allows attackers to redirect users to sites outside of one's Opencast install, potentially facilitating phishing attacks or other security issues. This issue is fixed in Opencast 12.5 and newer.

Database specific
{
    "cwe_ids": [
        "CWE-601"
    ]
}
References

Affected packages

Git / github.com/opencast/opencast

Affected ranges

Type
GIT
Repo
https://github.com/opencast/opencast
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed