| Vigilance Vulnerability Alerts watches vulnerabilities impacting your computers, describes security patches, and then alerts you to fix them. |
|
 |
|
|
Synthesis of the vulnerability 
An attacker can transmit malicious XML data to Jasig CAS Server with Google Accounts Integration, in order to bypass the authentication.
Impacted software: CAS Server.
Severity of this computer vulnerability: 4/4.
Creation date: 02/04/2014.
Références of this announce: VIGILANCE-VUL-14512.
Description of the vulnerability 
The SAML (Security Assertion Markup Language) standard uses XML data to manage the authentication. The Jasig CAS Server product supports SAML 2.0/Google Accounts Integration.
An XML document can contain declarations. However, the java/org/jasig/cas/util/SamlUtils.java file of Jasig CAS Server does not forbid these declarations with "http://apache.org/xml/features/disallow-doctype-decl".
Technical details about the attack procedure are unknown.
An attacker can therefore transmit malicious XML data to Jasig CAS Server with Google Accounts Integration, in order to bypass the authentication. Full bulletin, software filtering, emails, fixes, ... (request your free trial)
This security bulletin impacts software or systems such as CAS Server.
Our Vigilance Vulnerability Alerts team determined that the severity of this cybersecurity announce is critical.
The trust level is of type confirmed by the editor, with an origin of document.
An attacker with a expert ability can exploit this vulnerability alert.
Solutions for this threat 
Jasig CAS Server: version 3.5.2.1.
The version 3.5.2.1 is fixed:
http://www.jasig.org/cas/download
Jasig CAS Server: version 3.4.12.1.
The version 3.4.12.1 is fixed:
http://www.jasig.org/cas/download
Full bulletin, software filtering, emails, fixes, ... (request your free trial)
Computer vulnerabilities alerting service 
The Vigilance Vulnerability Alerts offer can be used to read workarounds.
|