Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-3527

Опубликовано: 24 июл. 2014
Источник: redhat
CVSS2: 5.8
EPSS Низкий

Описание

When using the CAS Proxy ticket authentication from Spring Security 3.1 to 3.2.4 a malicious CAS Service could trick another CAS Service into authenticating a proxy ticket that was not associated. This is due to the fact that the proxy ticket authentication uses the information from the HttpServletRequest which is populated based upon untrusted information within the HTTP request. This means if there are access control restrictions on which CAS services can authenticate to one another, those restrictions can be bypassed. If users are not using CAS Proxy tickets and not basing access control decisions based upon the CAS Service, then there is no impact to users.

When using Spring Security's CAS Proxy ticket authentication, a malicious CAS Service could trick another CAS Service into authenticating a proxy ticket that was not associated. A remote attacker could use this flaw to bypass any access control restrictions on which CAS services can authenticate to one another.

Отчет

This issue did not affect the versions of spring-security-cas provided by jasperreports-server-pro as shipped with Red Hat Enterprise Virtualization Manager 3 as they did not include support for CAS Proxy Service URL configuration via request parameters.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Virtualization 3jasperreports-server-proNot affected
Red Hat JBoss Enterprise Web Server 1othersNot affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-348->CWE-290
https://bugzilla.redhat.com/show_bug.cgi?id=1131359CAS: Access control bypass via untrusted infomation usage in proxy ticket authentication

EPSS

Процентиль: 58%
0.00359
Низкий

5.8 Medium

CVSS2

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 8 лет назад

When using the CAS Proxy ticket authentication from Spring Security 3.1 to 3.2.4 a malicious CAS Service could trick another CAS Service into authenticating a proxy ticket that was not associated. This is due to the fact that the proxy ticket authentication uses the information from the HttpServletRequest which is populated based upon untrusted information within the HTTP request. This means if there are access control restrictions on which CAS services can authenticate to one another, those restrictions can be bypassed. If users are not using CAS Proxy tickets and not basing access control decisions based upon the CAS Service, then there is no impact to users.

CVSS3: 9.8
nvd
больше 8 лет назад

When using the CAS Proxy ticket authentication from Spring Security 3.1 to 3.2.4 a malicious CAS Service could trick another CAS Service into authenticating a proxy ticket that was not associated. This is due to the fact that the proxy ticket authentication uses the information from the HttpServletRequest which is populated based upon untrusted information within the HTTP request. This means if there are access control restrictions on which CAS services can authenticate to one another, those restrictions can be bypassed. If users are not using CAS Proxy tickets and not basing access control decisions based upon the CAS Service, then there is no impact to users.

CVSS3: 9.8
debian
больше 8 лет назад

When using the CAS Proxy ticket authentication from Spring Security 3. ...

CVSS3: 9.8
github
больше 5 лет назад

Authorization Bypass in Spring Security

EPSS

Процентиль: 58%
0.00359
Низкий

5.8 Medium

CVSS2