apereo/phpcas is vulnerable to privilege escalation. The vulnerability exists because HTTP headers are not properly sanitized and the CAS
server service registry does not properly validate authorized services in sso federation which allows an attacker to gain to access user account on a vulnerable CASified
service without the user’s acknowledgment.
github.com/advisories/GHSA-8q72-6qq8-xv64
github.com/apereo/phpCAS/commit/b759361d904a2cb2a3bcee9411fc348cfde5d163
github.com/apereo/phpCAS/security/advisories/GHSA-8q72-6qq8-xv64
lists.debian.org/debian-lts-announce/2023/07/msg00007.html
lists.fedoraproject.org/archives/list/[email protected]/message/2XL7SMW6ESSP2Y6HHRYWW2MMCZSI4LBZ/
lists.fedoraproject.org/archives/list/[email protected]/message/RUA2JM6YT3ZXSZLBJVRA32AXYM3GJMO3/
lists.fedoraproject.org/archives/list/[email protected]/message/VJZGTWJ5ZXUUT47EHARNOUUNTH6SYDSE/