CVE-2010-3690
Summary
| CVE | CVE-2010-3690 |
|---|---|
| State | PUBLISHED |
| Assigner | redhat |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2010-10-07 21:00:01 UTC |
| Updated | 2026-04-29 01:13:23 UTC |
| Description | Multiple cross-site scripting (XSS) vulnerabilities in phpCAS before 1.1.3, when proxy mode is enabled, allow remote attackers to inject arbitrary web script or HTML via (1) a crafted Proxy Granting Ticket IOU (PGTiou) parameter to the callback function in client.php, (2) vectors involving functions that make getCallbackURL calls, or (3) vectors involving functions that make getURL calls. |
Risk And Classification
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
MediumAuthentication
NoneConfidentiality
NoneIntegrity
PartialAvailability
NoneAV:N/AC:M/Au:N/C:N/I:P/A:N
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Apereo | Phpcas | 0.2 | All | All | All |
| Application | Apereo | Phpcas | 0.3 | All | All | All |
| Application | Apereo | Phpcas | 0.3.1 | All | All | All |
| Application | Apereo | Phpcas | 0.3.2 | All | All | All |
| Application | Apereo | Phpcas | 0.4 | All | All | All |
| Application | Apereo | Phpcas | 0.4.1 | All | All | All |
| Application | Apereo | Phpcas | 0.4.10 | All | All | All |
| Application | Apereo | Phpcas | 0.4.11 | All | All | All |
| Application | Apereo | Phpcas | 0.4.12 | All | All | All |
| Application | Apereo | Phpcas | 0.4.13 | All | All | All |
| Application | Apereo | Phpcas | 0.4.14 | All | All | All |
| Application | Apereo | Phpcas | 0.4.15 | All | All | All |
| Application | Apereo | Phpcas | 0.4.16 | All | All | All |
| Application | Apereo | Phpcas | 0.4.17 | All | All | All |
| Application | Apereo | Phpcas | 0.4.18 | All | All | All |
| Application | Apereo | Phpcas | 0.4.19 | All | All | All |
| Application | Apereo | Phpcas | 0.4.20 | All | All | All |
| Application | Apereo | Phpcas | 0.4.21 | All | All | All |
| Application | Apereo | Phpcas | 0.4.22 | All | All | All |
| Application | Apereo | Phpcas | 0.4.23 | All | All | All |
| Application | Apereo | Phpcas | 0.4.8 | All | All | All |
| Application | Apereo | Phpcas | 0.4.9 | All | All | All |
| Application | Apereo | Phpcas | 0.5.0 | All | All | All |
| Application | Apereo | Phpcas | 0.5.1 | All | All | All |
| Application | Apereo | Phpcas | 0.6.0 | All | All | All |
| Application | Apereo | Phpcas | 1.0.0 | All | All | All |
| Application | Apereo | Phpcas | 1.0.1 | All | All | All |
| Application | Apereo | Phpcas | 1.1.0 | All | All | All |
| Application | Apereo | Phpcas | 1.1.1 | All | All | All |
| Application | Apereo | Phpcas | All | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| [SECURITY] Fedora 13 Update: glpi-0.72.4-3.svn11497.fc13 | af854a3a-2127-422b-91ae-364da2661108 | lists.fedoraproject.org | |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | |
| #495542 - ITP: php-cas -- Central Authentication Service client library in php - Debian Bug report logs | af854a3a-2127-422b-91ae-364da2661108 | bugs.debian.org | |
| [SECURITY] Fedora 13 Update: php-pear-CAS-1.1.3-1.fc13 | af854a3a-2127-422b-91ae-364da2661108 | lists.fedoraproject.org | |
| forge.indepnet.net/projects/glpi/repository/revisions/12601 | af854a3a-2127-422b-91ae-364da2661108 | forge.indepnet.net | |
| oss-security - Re: CVE request - phpCAS: prevent symlink attacks, directory traversal and XSS during a proxy callback | af854a3a-2127-422b-91ae-364da2661108 | www.openwall.com | |
| oss-security - Re: CVE request - phpCAS: prevent symlink attacks, directory traversal and XSS during a proxy callback | af854a3a-2127-422b-91ae-364da2661108 | www.openwall.com | |
| Debian update for moodle - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| phpCAS Proxy Mode Multiple Security Vulnerabilities | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| Debian -- Security Information -- DSA-2172-1 moodle | af854a3a-2127-422b-91ae-364da2661108 | www.debian.org | |
| GLPI phpCAS Multiple Vulnerabilities - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | |
| oss-security - CVE request - phpCAS: prevent symlink attacks, directory traversal and XSS during a proxy callback | af854a3a-2127-422b-91ae-364da2661108 | www.openwall.com | |
| [PHPCAS-80] Proxy tickets and writing on disk needs more checks - Jira | af854a3a-2127-422b-91ae-364da2661108 | issues.jasig.org | |
| Fedora update for php-pear-CAS - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| [SECURITY] Fedora 12 Update: glpi-0.72.4-3.svn11497.fc12 | af854a3a-2127-422b-91ae-364da2661108 | lists.fedoraproject.org | |
| [SECURITY] Fedora 12 Update: php-pear-CAS-1.1.3-1.fc12 | af854a3a-2127-422b-91ae-364da2661108 | lists.fedoraproject.org | |
| FishEye: changeset 21538 | af854a3a-2127-422b-91ae-364da2661108 | developer.jasig.org | |
| Fedora update for glpi - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.