Описание
phpCAS before 1.3.2 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
Пакеты
| Пакет | Статус | Версия исправления | Релиз | Тип |
|---|---|---|---|---|
| php-cas | fixed | 1.3.1-2 | package | |
| moodle | fixed | 2.2.7.dfsg-1 | package | |
| moodle | no-dsa | squeeze | package | |
| moodle | fixed | 2.2.3.dfsg-2.6~wheezy1 | wheezy | package |
Примечания
https://github.com/Jasig/phpCAS/pull/58
Связанные уязвимости
phpCAS before 1.3.2 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
phpCAS before 1.3.2 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.