CVE-2014-4172

NameCVE-2014-4172
DescriptionA URL parameter injection vulnerability was found in the back-channel ticket validation step of the CAS protocol in Jasig Java CAS Client before 3.3.2, .NET CAS Client before 1.0.2, and phpCAS before 1.3.3 that allow remote attackers to inject arbitrary web script or HTML via the (1) service parameter to validation/AbstractUrlBasedTicketValidator.java or (2) pgtUrl parameter to validation/Cas20ServiceTicketValidator.java.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-3017-1
Debian Bugs759718, 775842

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
php-cas (PTS)jessie1.3.3-1fixed
stretch (lts), stretch1.3.3-4+deb9u1fixed
buster (security), buster, buster (lts)1.3.6-1+deb10u1fixed
bullseye1.3.8-1+deb11u1fixed
sid, trixie, bookworm1.6.0-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
moodlesourcesqueeze(unfixed)end-of-life
moodlesource(unstable)2.7.2-1775842
php-cassourcewheezy1.3.1-4+deb7u1DSA-3017-1
php-cassource(unstable)1.3.3-1759718

Notes

https://github.com/Jasig/phpCAS/pull/125
[squeeze] - moodle <end-of-life> (Unsupported in squeeze-lts)
http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-46766

Search for package or bug name: Reporting problems