Name | CVE-2017-1000071 |
Description | Jasig phpCAS version 1.3.4 is vulnerable to an authentication bypass in the validateCAS20 function when configured to authenticate against an old CAS server. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | ELA-890-1 |
Debian Bugs | 868466 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
php-cas (PTS) | jessie | 1.3.3-1 | vulnerable |
| stretch (lts), stretch | 1.3.3-4+deb9u1 | fixed |
| buster (security), buster, buster (lts) | 1.3.6-1+deb10u1 | fixed |
| bullseye | 1.3.8-1+deb11u1 | fixed |
| sid, trixie, bookworm | 1.6.0-1 | fixed |
The information below is based on the following data on fixed versions.
Notes
[stretch] - php-cas <no-dsa> (Minor issue)
[jessie] - php-cas <no-dsa> (Minor issue)
[wheezy] - php-cas <no-dsa> (Minor issue, only works with old CAS server)
https://github.com/Jasig/phpCAS/issues/228
Fixed by: https://github.com/apereo/phpCAS/commit/c9ba00327fd0ac8faecc62ce150c1986022856cd
The vulnerability only exists when the server is affected by
another very old vulnerability fixed in 2010.