6.4
CVSSv2

CVE-2010-3692

CVSSv4: NA | CVSSv3: NA | CVSSv2: 6.4 | VMScore: 740 | EPSS: 0.01074 | KEV: Not Included
Published: 07/10/2010 Updated: 21/11/2024

Vulnerability Summary

Directory traversal vulnerability in the callback function in client.php in phpCAS prior to 1.1.3, when proxy mode is enabled, allows remote malicious users to create or overwrite arbitrary files via directory traversal sequences in a Proxy Granting Ticket IOU (PGTiou) parameter.

Vulnerable Product Search on Vulmon Subscribe to Product

apereo phpcas

apereo phpcas 0.2

apereo phpcas 0.3

apereo phpcas 0.3.1

apereo phpcas 0.3.2

apereo phpcas 0.4

apereo phpcas 0.4.1

apereo phpcas 0.4.8

apereo phpcas 0.4.9

apereo phpcas 0.4.10

apereo phpcas 0.4.11

apereo phpcas 0.4.12

apereo phpcas 0.4.13

apereo phpcas 0.4.14

apereo phpcas 0.4.15

apereo phpcas 0.4.16

apereo phpcas 0.4.17

apereo phpcas 0.4.18

apereo phpcas 0.4.19

apereo phpcas 0.4.20

apereo phpcas 0.4.21

apereo phpcas 0.4.22

apereo phpcas 0.4.23

apereo phpcas 0.5.0

apereo phpcas 0.5.1

apereo phpcas 0.6.0

apereo phpcas 1.0.0

apereo phpcas 1.0.1

apereo phpcas 1.1.0

apereo phpcas 1.1.1

Vendor Advisories

Several vulnerabilties have been discovered in phpCAS, a CAS client library for PHP The Moodle course management system includes a copy of phpCAS For the oldstable distribution (lenny), this problem has been fixed in version 1813-3 The stable distribution (squeeze) already contains a fixed version of phpCAS The unstable distribution (sid) alr ...

References

CWE-22https://nvd.nist.govhttps://www.debian.org/security/./dsa-2172https://www.first.org/epsshttp://bugs.debian.org/cgi-bin/bugreport.cgi?bug=495542#82http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050415.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2010-November/050428.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2010-October/049600.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2010-October/049602.htmlhttp://secunia.com/advisories/41878http://secunia.com/advisories/42149http://secunia.com/advisories/42184http://secunia.com/advisories/43427http://www.debian.org/security/2011/dsa-2172http://www.openwall.com/lists/oss-security/2010/09/29/6http://www.openwall.com/lists/oss-security/2010/10/01/2http://www.openwall.com/lists/oss-security/2010/10/01/5http://www.securityfocus.com/bid/43585http://www.vupen.com/english/advisories/2010/2705http://www.vupen.com/english/advisories/2010/2909http://www.vupen.com/english/advisories/2011/0456https://developer.jasig.org/source/changelog/jasigsvn?cs=21538https://forge.indepnet.net/projects/glpi/repository/revisions/12601https://issues.jasig.org/browse/PHPCAS-80http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=495542#82http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050415.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2010-November/050428.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2010-October/049600.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2010-October/049602.htmlhttp://secunia.com/advisories/41878http://secunia.com/advisories/42149http://secunia.com/advisories/42184http://secunia.com/advisories/43427http://www.debian.org/security/2011/dsa-2172http://www.openwall.com/lists/oss-security/2010/09/29/6http://www.openwall.com/lists/oss-security/2010/10/01/2http://www.openwall.com/lists/oss-security/2010/10/01/5http://www.securityfocus.com/bid/43585http://www.vupen.com/english/advisories/2010/2705http://www.vupen.com/english/advisories/2010/2909http://www.vupen.com/english/advisories/2011/0456https://developer.jasig.org/source/changelog/jasigsvn?cs=21538https://forge.indepnet.net/projects/glpi/repository/revisions/12601https://issues.jasig.org/browse/PHPCAS-80