Vulnerability Description
Directory traversal vulnerability in the callback function in client.php in phpCAS before 1.1.3, when proxy mode is enabled, allows remote attackers to create or overwrite arbitrary files via directory traversal sequences in a Proxy Granting Ticket IOU (PGTiou) parameter.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apereo | Phpcas | <= 1.1.2 |
Related Weaknesses (CWE)
References
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=495542#82
- http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050415.h
- http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050428.h
- http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049600.ht
- http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049602.ht
- http://secunia.com/advisories/41878
- http://secunia.com/advisories/42149
- http://secunia.com/advisories/42184
- http://secunia.com/advisories/43427
- http://www.debian.org/security/2011/dsa-2172
- http://www.openwall.com/lists/oss-security/2010/09/29/6
- http://www.openwall.com/lists/oss-security/2010/10/01/2
- http://www.openwall.com/lists/oss-security/2010/10/01/5
- http://www.securityfocus.com/bid/43585
- http://www.vupen.com/english/advisories/2010/2705
FAQ
What is CVE-2010-3692?
CVE-2010-3692 is a vulnerability with a CVSS score of 6.4 (MEDIUM). Directory traversal vulnerability in the callback function in client.php in phpCAS before 1.1.3, when proxy mode is enabled, allows remote attackers to create or overwrite arbitrary files via director...
How severe is CVE-2010-3692?
CVE-2010-3692 has been rated MEDIUM with a CVSS base score of 6.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2010-3692?
Check the references section above for vendor advisories and patch information. Affected products include: Apereo Phpcas.