A URL parameter injection vulnerability was found in the back-channel ticket validation step of the CAS protocol in Jasig Java CAS Client before 3.3.2, .NET CAS Client before 1.0.2, and phpCAS before 1.3.3 that allow remote attackers to inject arbitrary web script or HTML via the (1) service parameter to validation/AbstractUrlBasedTicketValidator.java or (2) pgtUrl parameter to validation/Cas20ServiceTicketValidator.java.
lists.fedoraproject.org/pipermail/package-announce/2014-August/137182.html
bugs.debian.org/cgi-bin/bugreport.cgi?bug=759718
bugzilla.redhat.com/show_bug.cgi?id=1131350
exchange.xforce.ibmcloud.com/vulnerabilities/95673
github.com/apereo/java-cas-client/commit/266eba7c2d870d70caba6f41576d19f2fcc869b1
github.com/Jasig/dotnet-cas-client/commit/f0e030014fb7a39e5f38469f43199dc590fd0e8d
github.com/Jasig/java-cas-client/commit/ae37092100c8eaec610dab6d83e5e05a8ee58814
github.com/Jasig/phpCAS/blob/master/docs/ChangeLog
github.com/Jasig/phpCAS/pull/125
issues.jasig.org/browse/CASC-228
nvd.nist.gov/vuln/detail/CVE-2014-4172
www.debian.org/security/2014/dsa-3017.en.html
www.mail-archive.com/[email protected]/msg17338.html