[Forgot Password]
Login  Register Subscribe

23631

 
 

115084

 
 

97559

 
 

909

 
 

78730

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2010-3692

Date: (C)2010-10-07   (M)2015-12-16
 
CVSS Score: 6.4Access Vector: NETWORK
Exploitability Subscore: 10.0Access Complexity: LOW
Impact Subscore: 4.9Authentication: NONE
 Confidentiality: NONE
 Integrity: PARTIAL
 Availability: PARTIAL











Directory traversal vulnerability in the callback function in client.php in phpCAS before 1.1.3, when proxy mode is enabled, allows remote attackers to create or overwrite arbitrary files via directory traversal sequences in a Proxy Granting Ticket IOU (PGTiou) parameter.

Reference:
SECUNIA-41878
SECUNIA-42149
SECUNIA-42184
SECUNIA-43427
BID-43585
ADV-2010-2705
ADV-2010-2909
ADV-2011-0456
DSA-2172
FEDORA-2010-15943
FEDORA-2010-15970
FEDORA-2010-16905
FEDORA-2010-16912
http://www.openwall.com/lists/oss-security/2010/09/29/6
http://www.openwall.com/lists/oss-security/2010/10/01/2
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=495542#82
https://developer.jasig.org/source/changelog/jasigsvn?cs=21538
https://forge.indepnet.net/projects/glpi/repository/revisions/12601
https://issues.jasig.org/browse/PHPCAS-80

CPE    30
cpe:/a:jasig:phpcas:0.4.22
cpe:/a:jasig:phpcas:0.4.21
cpe:/a:jasig:phpcas:0.4.20
cpe:/a:jasig:phpcas:1.1.1
...
CWE    1
CWE-22
OVAL    6
oval:org.secpod.oval:def:100083
oval:org.secpod.oval:def:100128
oval:org.secpod.oval:def:100264
oval:org.secpod.oval:def:100222
...

© 2013 SecPod Technologies