CVE-2021-43821

9.9 CRITICAL

📋 TL;DR

Opencast versions before 9.10 and 10.6 allow attackers with media ingestion privileges to include local file URLs in media packages, exposing sensitive files from the host system through the web interface. This vulnerability enables extraction of secrets and sensitive data from the server. Organizations using vulnerable Opencast installations for lecture capture and video management are affected.

💻 Affected Systems

Products:
  • Opencast
Versions: All versions before 9.10 and before 10.6
Operating Systems: Linux, Unix-based systems
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker to have media ingestion privileges, which are often widely granted in educational environments.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of host machine secrets including database credentials, API keys, SSH keys, and configuration files leading to full system takeover.

🟠

Likely Case

Extraction of sensitive configuration files and credentials stored on the Opencast server, potentially enabling lateral movement or data exfiltration.

🟢

If Mitigated

Limited exposure of non-critical files if proper file system permissions and access controls are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with media ingestion privileges. The vulnerability is straightforward to exploit once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Opencast 9.10, 10.6, or 11.0

Vendor Advisory: https://github.com/opencast/opencast/security/advisories/GHSA-59g4-hpg3-3gcp

Restart Required: Yes

Instructions:

1. Backup your Opencast installation and database. 2. Download and install Opencast 9.10, 10.6, or 11.0 from the official repository. 3. Follow the upgrade documentation for your specific version. 4. Restart all Opencast services. 5. Verify the fix by testing media ingestion with local file URLs.

🔧 Temporary Workarounds

Restrict Opencast File System Access

linux

Implement strict UNIX permissions or SELinux policies to limit Opencast's read access to only necessary directories.

chmod -R 750 /path/to/opencast/data
setenforce 1
semanage fcontext -a -t httpd_sys_content_t '/path/to/opencast/data(/.*)?'
restorecon -Rv /path/to/opencast/data

🧯 If You Can't Patch

  • Implement strict access controls to limit who has media ingestion privileges
  • Deploy network segmentation to isolate Opencast servers from sensitive systems

🔍 How to Verify

Check if Vulnerable:

Check Opencast version: if version is below 9.10 or below 10.6, the system is vulnerable.

Check Version:

Check the Opencast admin interface or examine the installation directory for version files.

Verify Fix Applied:

After patching, attempt to ingest media with local file URLs (e.g., file:///etc/passwd) - this should fail or be blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns in Opencast logs
  • Media ingestion requests containing file:// URLs
  • Access to sensitive system files from Opencast processes

Network Indicators:

  • Unusual outbound traffic from Opencast server following media ingestion

SIEM Query:

source="opencast" AND (url="file://" OR path="/etc/" OR path="/root/")

🔗 References

📤 Share & Export