8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
6 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:S/C:P/I:P/A:P
0.003 Low
EPSS
Percentile
65.6%
apereo/phpcas is vulnerable to privilege escalation. The vulnerability exists because HTTP headers are not properly sanitized and the CAS
server service registry does not properly validate authorized services in sso federation which allows an attacker to gain to access user account on a vulnerable CASified
service without the user’s acknowledgment.
CPE | Name | Operator | Version |
---|---|---|---|
apereo/phpcas | le | 1.5.0 | |
php-cas:sid | eq | 1.3.8-1 | |
apereo/phpcas | le | 1.5.0 | |
php-cas:sid | eq | 1.3.8-1 |
github.com/advisories/GHSA-8q72-6qq8-xv64
github.com/apereo/phpCAS/commit/b759361d904a2cb2a3bcee9411fc348cfde5d163
github.com/apereo/phpCAS/security/advisories/GHSA-8q72-6qq8-xv64
lists.debian.org/debian-lts-announce/2023/07/msg00007.html
lists.fedoraproject.org/archives/list/[email protected]/message/2XL7SMW6ESSP2Y6HHRYWW2MMCZSI4LBZ/
lists.fedoraproject.org/archives/list/[email protected]/message/RUA2JM6YT3ZXSZLBJVRA32AXYM3GJMO3/
lists.fedoraproject.org/archives/list/[email protected]/message/VJZGTWJ5ZXUUT47EHARNOUUNTH6SYDSE/
8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
6 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:S/C:P/I:P/A:P
0.003 Low
EPSS
Percentile
65.6%