The protections against path traversal attacks in the UI config module are insufficient, still partially allowing for attacks in very specific cases.
The path is checked without checking for the file separator. This could allow attackers access to files within another folder which starts with the same path. For example, the default UI config directory is placed at /etc/opencast/ui-config
. Without this patch, an attacker can get access to files in a folder /etc/opencast/ui-config-hidden
if those files are readable by Opencast.
General path traversal is not possible. For example, an attacker cannot exploit this to access files in /etc/opencast/encoding
or even in /etc/opencast/
directly.
Theoretically, this vulnerability may be exploited to get access to some non-public files. However, given the default structure of Opencast's configuration, this is extremely unlikely to hit any users. There can be but one ui-config
folders. This makes it quite unlikely for any user to have created an additional folder starting with ui-config
. Users could also rename this folder, but since there is no real reason for anyone to do this, this, again is extremely unlikely to trigger this issue.
ui-config
folder{ "severity": "LOW", "github_reviewed": true, "github_reviewed_at": "2025-08-29T15:34:37Z", "nvd_published_at": "2025-08-29T16:15:36Z", "cwe_ids": [ "CWE-23" ] }