Lucene search

K
ubuntuUbuntuUSN-6913-2
HistoryJul 31, 2024 - 12:00 a.m.

phpCAS vulnerability

2024-07-3100:00:00
ubuntu.com
7
ubuntu 16.04 esm
php-cas
central authentication service

CVSS3

8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

AI Score

7.1

Confidence

Low

EPSS

0.002

Percentile

60.9%

Releases

  • Ubuntu 16.04 ESM

Packages

  • php-cas - Central Authentication Service client library in php

Details

USN-6913-1 fixed CVE-2022-39369 for Ubuntu 20.04 LTS and Ubuntu 22.04 LTS.
This update provides the corresponding fix for Ubuntu 16.04 LTS.

Original advisory details:

Filip Hejsek discovered that phpCAS was using HTTP headers to determine
the service URL used to validate tickets. A remote attacker could
possibly use this issue to gain access to a victim’s account on a
vulnerable CASified service.

This security update introduces an incompatible API change. After applying
this update, third party applications need to be modified to pass in an
additional service base URL argument when constructing the client class.

For more information please refer to the section
“Upgrading 1.5.0 -> 1.6.0” of the phpCAS upgrading document:

<https://github.com/apereo/phpCAS/blob/master/docs/Upgrading&gt;

OSVersionArchitecturePackageVersionFilename
Ubuntu16.04noarchphp-cas< 1.3.3-2ubuntu1+esm1UNKNOWN
Ubuntu16.04noarchphp-cas< 1.3.3-2ubuntu1UNKNOWN

CVSS3

8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

AI Score

7.1

Confidence

Low

EPSS

0.002

Percentile

60.9%