Описание
A vulnerability was found in Apereo CAS 5.2.6. It has been classified as problematic. This affects the function ResponseEntity of the file cas-5.2.6\webapp-mgmt\cas-management-webapp-support\src\main\java\org\apereo\cas\mgmt\services\web\ManageRegisteredServicesMultiActionController.java. The manipulation of the argument Query leads to inefficient regular expression complexity. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Ссылки
- Permissions RequiredVDB Entry
- Third Party AdvisoryVDB Entry
- Third Party AdvisoryVDB Entry
- Not Applicable
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:apereo:central_authentication_service:5.2.6:*:*:*:*:*:*:*
EPSS
Процентиль: 43%
0.00205
Низкий
2.7 Low
CVSS3
4.9 Medium
CVSS3
3.3 Low
CVSS2
Дефекты
CWE-400
Связанные уязвимости
CVSS3: 2.7
github
10 месяцев назад
Apereo CAS has inefficient regular expression complexity
EPSS
Процентиль: 43%
0.00205
Низкий
2.7 Low
CVSS3
4.9 Medium
CVSS3
3.3 Low
CVSS2
Дефекты
CWE-400