Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-9fc5-q25c-r2wr

Опубликовано: 17 мая 2022
Источник: github
Github: Прошло ревью
CVSS3: 9.8

Описание

Jasig Java CAS Client, .NET CAS Client, and phpCAS contain URL parameter injection vulnerability

A URL parameter injection vulnerability was found in the back-channel ticket validation step of the CAS protocol in Jasig Java CAS Client before 3.3.2, .NET CAS Client before 1.0.2, and phpCAS before 1.3.3 that allow remote attackers to inject arbitrary web script or HTML via the (1) service parameter to validation/AbstractUrlBasedTicketValidator.java or (2) pgtUrl parameter to validation/Cas20ServiceTicketValidator.java.

Пакеты

Наименование

DotNetCasClient

nuget
Затронутые версииВерсия исправления

< 1.0.2

1.0.2

Наименование

org.jasig.cas:cas-client

maven
Затронутые версииВерсия исправления

< 3.3.2

3.3.2

Наименование

jasig/phpcas

composer
Затронутые версииВерсия исправления

< 1.3.3

1.3.3

EPSS

Процентиль: 91%
0.06742
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-74

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 6 лет назад

A URL parameter injection vulnerability was found in the back-channel ticket validation step of the CAS protocol in Jasig Java CAS Client before 3.3.2, .NET CAS Client before 1.0.2, and phpCAS before 1.3.3 that allow remote attackers to inject arbitrary web script or HTML via the (1) service parameter to validation/AbstractUrlBasedTicketValidator.java or (2) pgtUrl parameter to validation/Cas20ServiceTicketValidator.java.

redhat
больше 11 лет назад

A URL parameter injection vulnerability was found in the back-channel ticket validation step of the CAS protocol in Jasig Java CAS Client before 3.3.2, .NET CAS Client before 1.0.2, and phpCAS before 1.3.3 that allow remote attackers to inject arbitrary web script or HTML via the (1) service parameter to validation/AbstractUrlBasedTicketValidator.java or (2) pgtUrl parameter to validation/Cas20ServiceTicketValidator.java.

CVSS3: 9.8
nvd
около 6 лет назад

A URL parameter injection vulnerability was found in the back-channel ticket validation step of the CAS protocol in Jasig Java CAS Client before 3.3.2, .NET CAS Client before 1.0.2, and phpCAS before 1.3.3 that allow remote attackers to inject arbitrary web script or HTML via the (1) service parameter to validation/AbstractUrlBasedTicketValidator.java or (2) pgtUrl parameter to validation/Cas20ServiceTicketValidator.java.

CVSS3: 9.8
debian
около 6 лет назад

A URL parameter injection vulnerability was found in the back-channel ...

EPSS

Процентиль: 91%
0.06742
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-74