Vulnerability CVE-2010-3690


Published: 2010-10-07   Modified: 2012-02-13

Description:
Multiple cross-site scripting (XSS) vulnerabilities in phpCAS before 1.1.3, when proxy mode is enabled, allow remote attackers to inject arbitrary web script or HTML via (1) a crafted Proxy Granting Ticket IOU (PGTiou) parameter to the callback function in client.php, (2) vectors involving functions that make getCallbackURL calls, or (3) vectors involving functions that make getURL calls.

Type:

CWE-79

(Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'))

CVSS2 => (AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
Jasig -> Phpcas 

 References:
https://issues.jasig.org/browse/PHPCAS-80
https://forge.indepnet.net/projects/glpi/repository/revisions/12601
https://developer.jasig.org/source/changelog/jasigsvn?cs=21538
http://www.vupen.com/english/advisories/2011/0456
http://www.vupen.com/english/advisories/2010/2909
http://www.vupen.com/english/advisories/2010/2705
http://www.securityfocus.com/bid/43585
http://www.openwall.com/lists/oss-security/2010/10/01/5
http://www.openwall.com/lists/oss-security/2010/10/01/2
http://www.openwall.com/lists/oss-security/2010/09/29/6
http://www.debian.org/security/2011/dsa-2172
http://secunia.com/advisories/43427
http://secunia.com/advisories/42184
http://secunia.com/advisories/42149
http://secunia.com/advisories/41878
http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049602.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049600.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050428.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050415.html
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=495542#82

Copyright 2024, cxsecurity.com

 

Back to Top