Advisories for Maven/Org.opencastproject/Opencast-Common-Jpa-Impl package

2020

Use of a Broken or Risky Cryptographic Algorithm

Opencast before 8.1 stores passwords using the rather outdated and cryptographically insecure MD5 hash algorithm. Furthermore, the hashes are salted using the username instead of a random salt, causing hashes for users with the same username and password to collide which is problematic especially for popular users like the default admin user. This essentially means that for an attacker, it might be feasible to reconstruct a user's password given access …