Description
Opencast before 7.6 and 8.1 enables a remember-me cookie based on a hash created from the username, password, and an additional system key. This means that an attacker getting access to a remember-me token for one server can get access to all servers which allow log-in using the same credentials without ever needing the credentials. This problem is fixed in Opencast 7.6 and Opencast 8.1
Remediation
References
https://github.com/opencast/opencast/commit/1a7172c95af8d542a77ae5b153e4c834dd4788a6
https://github.com/opencast/opencast/security/advisories/GHSA-mh8g-hprg-8363
Related Vulnerabilities
CVE-2020-15156 Vulnerability in npm package nodebb-plugin-blog-comments
CVE-2021-21266 Vulnerability in maven package org.openhab.addons.bundles:org.openhab.binding.sonos
CVE-2021-46089 Vulnerability in maven package org.jeecgframework.boot:jeecg-boot-base-core
CVE-2022-31108 Vulnerability in maven package org.webjars.bower:mermaid
CVE-2020-28498 Vulnerability in maven package org.webjars.npm:elliptic