Debian Php-Cas vulnerabilities
4 known vulnerabilities affecting debian/php-cas.
Total CVEs
4
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH2MEDIUM1
Vulnerabilities
Page 1 of 1
CVE-2022-39369HIGHCVSS 8.0fixed in php-cas 1.6.0-1 (bookworm)2022
CVE-2022-39369 [HIGH] CVE-2022-39369: php-cas - phpCAS is an authentication library that allows PHP applications to easily authe...
phpCAS is an authentication library that allows PHP applications to easily authenticate users via a Central Authentication Service (CAS) server. The phpCAS library uses HTTP headers to determine the service URL used to validate tickets. This allows an attacker to control the host header and use a valid ticket granted for any authorized service in the same SSO realm
debian
CVE-2017-1000071HIGHCVSS 8.1fixed in php-cas 1.3.6-1 (bookworm)2017
CVE-2017-1000071 [HIGH] CVE-2017-1000071: php-cas - Jasig phpCAS version 1.3.4 is vulnerable to an authentication bypass in the vali...
Jasig phpCAS version 1.3.4 is vulnerable to an authentication bypass in the validateCAS20 function when configured to authenticate against an old CAS server.
Scope: local
bookworm: resolved (fixed in 1.3.6-1)
bullseye: resolved (fixed in 1.3.6-1)
forky: resolved (fixed in 1.3.6-1)
sid: resolved (fixed in 1.3.6-1)
trixie: resolved (fixed in 1.3.6-1)
debian
CVE-2014-4172CRITICALCVSS 9.8fixed in php-cas 1.3.3-1 (bookworm)2014
CVE-2014-4172 [CRITICAL] CVE-2014-4172: php-cas - A URL parameter injection vulnerability was found in the back-channel ticket val...
A URL parameter injection vulnerability was found in the back-channel ticket validation step of the CAS protocol in Jasig Java CAS Client before 3.3.2, .NET CAS Client before 1.0.2, and phpCAS before 1.3.3 that allow remote attackers to inject arbitrary web script or HTML via the (1) service parameter to validation/AbstractUrlBasedTicketValidator.java or (2) pgtUr
debian
CVE-2012-5583MEDIUMCVSS 5.8fixed in php-cas 1.3.1-2 (bookworm)2012
CVE-2012-5583 [MEDIUM] CVE-2012-5583: php-cas - phpCAS before 1.3.2 does not verify that the server hostname matches a domain na...
phpCAS before 1.3.2 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
Scope: local
bookworm: resolved (fixed in 1.3.1-2)
bullseye: resolved (fixed in 1.3.1-2)
forky: resolve
debian