Summary
This host is installed with phpCAS and is prone to session hijacking and cross-site scripting vulnerabilities.
Impact
Successful exploitation will allow remote attackers to execute arbitrary HTML and script code in a user's browser session in the context of an affected site and to hijack another user's account and gain the victims privileges.
Impact Level: Application.
Solution
Upgrade to phpCAS version 1.1.2 or later,
For updates refer to https://wiki.jasig.org/display/CASC/phpCAS
Insight
The flaw exists due to:
- improper validation of service tickets prior to assigning the new session.
This can be exploited to hijack another user's session by guessing valid service tickets.
- improper validation of the callback URL.
Affected
phpCAS version prior to 1.1.2
References
Severity
Classification
-
CVE CVE-2010-2795, CVE-2010-2796 -
CVSS Base Score: 4.0
AV:N/AC:L/Au:S/C:N/I:P/A:N
Related Vulnerabilities