phpCAS before 1.1.2 allows remote authenticated users to hijack sessions via a query string containing a crafted ticket value.
lists.fedoraproject.org/pipermail/package-announce/2010-August/046576.html
lists.fedoraproject.org/pipermail/package-announce/2010-August/046584.html
lists.fedoraproject.org/pipermail/package-announce/2010-November/050415.html
lists.fedoraproject.org/pipermail/package-announce/2010-November/050428.html
secunia.com/advisories/40845
secunia.com/advisories/41240
secunia.com/advisories/42149
secunia.com/advisories/42184
secunia.com/advisories/43427
www.debian.org/security/2011/dsa-2172
www.securityfocus.com/bid/42162
www.vupen.com/english/advisories/2010/2234
www.vupen.com/english/advisories/2010/2261
www.vupen.com/english/advisories/2010/2909
www.vupen.com/english/advisories/2011/0456
exchange.xforce.ibmcloud.com/vulnerabilities/60894
forge.indepnet.net/projects/glpi/repository/revisions/12601
issues.jasig.org/browse/PHPCAS-61
wiki.jasig.org/display/CASC/phpCAS+ChangeLog