First published: Thu Oct 07 2010(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in phpCAS before 1.1.3, when proxy mode is enabled, allow remote attackers to inject arbitrary web script or HTML via (1) a crafted Proxy Granting Ticket IOU (PGTiou) parameter to the callback function in client.php, (2) vectors involving functions that make getCallbackURL calls, or (3) vectors involving functions that make getURL calls.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apereo phpCAS | =0.2 | |
Apereo phpCAS | =0.3 | |
Apereo phpCAS | =0.3.1 | |
Apereo phpCAS | =0.3.2 | |
Apereo phpCAS | =0.4 | |
Apereo phpCAS | =0.4.1 | |
Apereo phpCAS | =0.4.8 | |
Apereo phpCAS | =0.4.9 | |
Apereo phpCAS | =0.4.10 | |
Apereo phpCAS | =0.4.11 | |
Apereo phpCAS | =0.4.12 | |
Apereo phpCAS | =0.4.13 | |
Apereo phpCAS | =0.4.14 | |
Apereo phpCAS | =0.4.15 | |
Apereo phpCAS | =0.4.16 | |
Apereo phpCAS | =0.4.17 | |
Apereo phpCAS | =0.4.18 | |
Apereo phpCAS | =0.4.19 | |
Apereo phpCAS | =0.4.20 | |
Apereo phpCAS | =0.4.21 | |
Apereo phpCAS | =0.4.22 | |
Apereo phpCAS | =0.4.23 | |
Apereo phpCAS | =0.5.0 | |
Apereo phpCAS | =0.5.1 | |
Apereo phpCAS | =0.6.0 | |
Apereo phpCAS | =1.0.0 | |
Apereo phpCAS | =1.0.1 | |
Apereo phpCAS | =1.1.0 | |
Apereo phpCAS | =1.1.1 | |
Apereo phpCAS | <=1.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-3690 is considered a medium severity vulnerability due to its potential for cross-site scripting attacks.
To fix CVE-2010-3690, upgrade to phpCAS version 1.1.3 or later where the vulnerabilities have been patched.
CVE-2010-3690 affects multiple versions of phpCAS prior to 1.1.3.
Yes, CVE-2010-3690 can lead to data compromise through cross-site scripting, enabling attackers to inject malicious scripts.
While CVE-2010-3690 primarily involves XSS, it can indirectly affect authentication by allowing attackers to capture credentials.