Summary

opencast/opencast disabled hostname verification and used an insecure TrustManager for HTTPS connections making clients vulnerable a to machine-in-the-middle attack (MiTM).

Product

opencast/opencast

Tested Version

Commit 4b905437

Details

The HttpClientImpl class disables hostname verification by using a hostname verifier that accepts all hostnames by always returning true. The method also uses an insecure TrustManager that trusts all certificates even self-signed certificates.

Disabled hostname verification allows an attacker to use any valid certificate when intercepting a connection. Even when the hostname of the certificate does NOT match the hostname of the connection. An insecure TrustManager allows an attacker to create a self-signed certificate that matches the hostname of the intercepted connection.

Impact

Machine-in-the-middle attack.

CVE

CVE-2020-26234

Github Advisories

GHSA-44cw-p2hm-gpf6

Coordinated Disclosure Timeline

  • 2020-10-16: Sent a mail to security@opencast.org.
  • 2020-11-17: CVE id is shared with me.
  • 2020-12-08: Issue is patched.
  • 2020-12-08: Advisory is published.

Credit

This issue was discovered and reported by @intrigus-lgtm.

Contact

You can contact the ISL at isl@intrigus.org. Please include a reference to ISL-2020-007 in any communication regarding this issue.