USN-6913-1

See a problem?
Source
https://ubuntu.com/security/notices/USN-6913-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6913-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-6913-1
Related
Published
2024-07-24T18:45:17.726158Z
Modified
2024-07-24T18:45:17.726158Z
Summary
php-cas vulnerability
Details

Filip Hejsek discovered that phpCAS was using HTTP headers to determine the service URL used to validate tickets. A remote attacker could possibly use this issue to gain access to a victim's account on a vulnerable CASified service.

This security update introduces an incompatible API change. After applying this update, third party applications need to be modified to pass in an additional service base URL argument when constructing the client class.

For more information please refer to the section "Upgrading 1.5.0 -> 1.6.0" of the phpCAS upgrading document:

https://github.com/apereo/phpCAS/blob/master/docs/Upgrading

References

Affected packages

Ubuntu:20.04:LTS / php-cas

Package

Name
php-cas
Purl
pkg:deb/ubuntu/php-cas?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.8-1ubuntu0.20.04.1

Affected versions

1.*

1.3.6-1
1.3.8-1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "1.3.8-1ubuntu0.20.04.1",
            "binary_name": "php-cas"
        }
    ]
}

Ubuntu:22.04:LTS / php-cas

Package

Name
php-cas
Purl
pkg:deb/ubuntu/php-cas?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.8-1ubuntu0.22.04.1

Affected versions

1.*

1.3.8-1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "1.3.8-1ubuntu0.22.04.1",
            "binary_name": "php-cas"
        }
    ]
}