[prev in list] [next in list] [prev in thread] [next in thread]
List: oss-security
Subject: [oss-security] CVE request - phpCAS: prevent symlink attacks, directory traversal
From: Joachim Fritschi <fritschi () hrz ! tu-darmstadt ! de>
Date: 2010-09-29 13:06:16
Message-ID: 4CA339C8.5050600 () hrz ! tu-darmstadt ! de
[Download RAW message or body]
Reported by Raphael Geissert almost 2 years ago but never really made it
into the upstream code:
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=495542#82
In phpCAS proxy mode the parameters submitted during a callback to the
callback() function are not properly sanatized. The parameters are used
as file handles for filesystem access and parameters in urls.
This allows an attacker symlink attacks, directory traversal attacks and
XSS attacks. The issue has been fixed and patches are available:
https://issues.jasig.org/browse/PHPCAS-80
https://developer.jasig.org/source/changelog/jasigsvn?cs=21538
A new 1.1.3 release which contains the patch and various other bugfixes
will be released within the next few days.
Cheers,
Joachim
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic