First published: Thu Oct 07 2010(Updated: )
Directory traversal vulnerability in the callback function in client.php in phpCAS before 1.1.3, when proxy mode is enabled, allows remote attackers to create or overwrite arbitrary files via directory traversal sequences in a Proxy Granting Ticket IOU (PGTiou) parameter.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apereo phpCAS | <=1.1.2 | |
Apereo phpCAS | =0.2 | |
Apereo phpCAS | =0.3 | |
Apereo phpCAS | =0.3.1 | |
Apereo phpCAS | =0.3.2 | |
Apereo phpCAS | =0.4 | |
Apereo phpCAS | =0.4.1 | |
Apereo phpCAS | =0.4.8 | |
Apereo phpCAS | =0.4.9 | |
Apereo phpCAS | =0.4.10 | |
Apereo phpCAS | =0.4.11 | |
Apereo phpCAS | =0.4.12 | |
Apereo phpCAS | =0.4.13 | |
Apereo phpCAS | =0.4.14 | |
Apereo phpCAS | =0.4.15 | |
Apereo phpCAS | =0.4.16 | |
Apereo phpCAS | =0.4.17 | |
Apereo phpCAS | =0.4.18 | |
Apereo phpCAS | =0.4.19 | |
Apereo phpCAS | =0.4.20 | |
Apereo phpCAS | =0.4.21 | |
Apereo phpCAS | =0.4.22 | |
Apereo phpCAS | =0.4.23 | |
Apereo phpCAS | =0.5.0 | |
Apereo phpCAS | =0.5.1 | |
Apereo phpCAS | =0.6.0 | |
Apereo phpCAS | =1.0.0 | |
Apereo phpCAS | =1.0.1 | |
Apereo phpCAS | =1.1.0 | |
Apereo phpCAS | =1.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-3692 is considered a medium severity vulnerability due to the potential for remote file manipulation.
To fix CVE-2010-3692, upgrade phpCAS to version 1.1.3 or later where the vulnerability has been addressed.
CVE-2010-3692 affects all versions of phpCAS prior to 1.1.3, particularly when proxy mode is enabled.
CVE-2010-3692 is a directory traversal vulnerability that allows unauthorized file creation or overwriting.
Yes, CVE-2010-3692 can be exploited remotely by attackers sending crafted requests with directory traversal sequences.