[MAVEN:GHSA-9FC5-Q25C-R2WR] Jasig Java CAS Client, .NET CAS Client, and phpCAS contain URL parameter injection vulnerability

Severity Critical
Affected Packages 3
Fixed Packages 3
CVEs 1

A URL parameter injection vulnerability was found in the back-channel ticket validation step of the CAS protocol in Jasig Java CAS Client before 3.3.2, .NET CAS Client before 1.0.2, and phpCAS before 1.3.3 that allow remote attackers to inject arbitrary web script or HTML via the (1) service parameter to validation/AbstractUrlBasedTicketValidator.java or (2) pgtUrl parameter to validation/Cas20ServiceTicketValidator.java.

ID
MAVEN:GHSA-9FC5-Q25C-R2WR
Severity
critical
URL
https://github.com/advisories/GHSA-9fc5-q25c-r2wr
Published
2022-05-17T19:57:18
(2 years ago)
Modified
2023-02-02T05:03:46
(19 months ago)
Rights
Maven Security Team
Other Advisories
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:maven/org.jasig.cas/cas-client org.jasig.cas cas-client < 3.3.2
Fixed pkg:maven/org.jasig.cas/cas-client org.jasig.cas cas-client = 3.3.2
Affected pkg:maven/jasig/phpcas jasig phpcas < 1.3.3
Fixed pkg:maven/jasig/phpcas jasig phpcas = 1.3.3
Affected pkg:maven/DotNetCasClient DotNetCasClient < 1.0.2
Fixed pkg:maven/DotNetCasClient DotNetCasClient = 1.0.2
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...