First published: Thu Dec 05 2019(Updated: )
A Security Bypass vulnerability exists in the phpCAS 1.2.2 library from the jasig project due to the way proxying of services are managed.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apereo Phpcas | =1.2.2 | |
Linux Linux kernel | ||
Debian Debian Linux | =8.0 | |
debian/glpi | ||
debian/moodle |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2012-1104 is medium with a severity value of 5.3.
The affected software for CVE-2012-1104 includes Apereo Phpcas version 1.2.2.
To fix CVE-2012-1104, you should upgrade to a patched version of the phpCAS library.
You can find more information about CVE-2012-1104 at the following references: [Openwall](http://www.openwall.com/lists/oss-security/2012/03/05/7), [Red Hat Bugzilla](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-1104), [GitLab](https://gitlab.vsb.cz/kal0178/sixmon/blob/b18bcde090dc38fc968a0b1e38d1dab08b8c369e/web/lib/CAS/CAS-1.3.5/docs/ChangeLog).
The Common Weakness Enumeration (CWE) for CVE-2012-1104 is CWE-269.