[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    [oss-security] CVE request - phpCAS: prevent symlink attacks, directory traversal
From:       Joachim Fritschi <fritschi () hrz ! tu-darmstadt ! de>
Date:       2010-09-29 13:06:16
Message-ID: 4CA339C8.5050600 () hrz ! tu-darmstadt ! de
[Download RAW message or body]

Reported by Raphael Geissert almost 2 years ago but never really made it 
into the upstream code:

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=495542#82

In phpCAS proxy mode the parameters submitted during a callback to the 
callback() function are not properly sanatized. The parameters are used 
as file handles for filesystem access and parameters in urls.
This allows an attacker symlink attacks, directory traversal attacks and 
XSS attacks. The issue has been fixed and patches are available:

https://issues.jasig.org/browse/PHPCAS-80
https://developer.jasig.org/source/changelog/jasigsvn?cs=21538

A new 1.1.3 release which contains the patch and various other bugfixes 
will be released within the next few days.

Cheers,

Joachim

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic