Summary
This host is installed with phpCAS and is prone to session hijacking and cross-site scripting vulnerabilities.
Impact
Successful exploitation will allow remote attackers to execute arbitrary HTML and script code in a user's browser session in the context of an affected site and to hijack another user's account and gain the victims privileges.
Impact Level: Application.
Solution
Upgrade to phpCAS version 1.1.2 or later,
For updates refer to https://wiki.jasig.org/display/CASC/phpCAS
Insight
The flaw exists due to:
- improper validation of service tickets prior to assigning the new session.
This can be exploited to hijack another user's session by guessing valid service tickets.
- improper validation of the callback URL.
Affected
phpCAS version prior to 1.1.2
References
Severity
Classification
-
CVE CVE-2010-2795, CVE-2010-2796 -
CVSS Base Score: 4.0
AV:N/AC:L/Au:S/C:N/I:P/A:N
Related Vulnerabilities
- Apple Safari Webkit Multiple Vulnerabilities - June13 (Mac OS X)
- Adobe Flash Player Unspecified Cross-Site Scripting Vulnerability June-2011 (Linux)
- Adobe Reader Information Disclosure Vulnerability Jun05 (Windows)
- Adobe Reader Cross-Site Scripting & Denial of Service Vulnerabilities (Mac OS X)
- Adobe Reader Information Disclosure & Code Execution Vulnerabilities (Linux)