CVE-2014-4172Injection in Java CAS Client

CWE-74Injection9 documents7 sources
Severity
9.8CRITICALNVD
EPSS
12.7%
top 5.99%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 24
Latest updateNov 28

Description

A URL parameter injection vulnerability was found in the back-channel ticket validation step of the CAS protocol in Jasig Java CAS Client before 3.3.2, .NET CAS Client before 1.0.2, and phpCAS before 1.3.3 that allow remote attackers to inject arbitrary web script or HTML via the (1) service parameter to validation/AbstractUrlBasedTicketValidator.java or (2) pgtUrl parameter to validation/Cas20ServiceTicketValidator.java.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages5 packages

Packagistjasig/phpcas< 1.3.3
NVDapereo/phpcas< 1.3.3
debiandebian/php-cas< php-cas 1.3.3-1 (bookworm)

Also affects: Debian Linux 7.0, Fedora 20

Patches

🔴Vulnerability Details

3
OSV
Jasig Java CAS Client, .NET CAS Client, and phpCAS contain URL parameter injection vulnerability2022-05-17
GHSA
Jasig Java CAS Client, .NET CAS Client, and phpCAS contain URL parameter injection vulnerability2022-05-17
OSV
CVE-2014-4172: A URL parameter injection vulnerability was found in the back-channel ticket validation step of the CAS protocol in Jasig Java CAS Client before 32020-01-24

📋Vendor Advisories

2
Red Hat
cas-client: Bypass of security constraints via URL parameter injection2014-08-11
Debian
CVE-2014-4172: php-cas - A URL parameter injection vulnerability was found in the back-channel ticket val...2014

📄Research Papers

1
arXiv
Evaluating LLMs for One-Shot Patching of Real and Artificial Vulnerabilities2025-11-28

💬Community

2
Bugzilla
CVE-2014-4172 cas-client: Bypass of security constraints via URL parameter injection2014-08-19
Bugzilla
CVE-2014-4172 cas-client: Bypass of security constraints via URL parameter injection [fedora-all]2014-08-19