CVE-2010-3692
Summary
| CVE | CVE-2010-3692 |
|---|---|
| State | PUBLISHED |
| Assigner | redhat |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2010-10-07 21:00:02 UTC |
| Updated | 2026-04-29 01:13:23 UTC |
| Description | Directory traversal vulnerability in the callback function in client.php in phpCAS before 1.1.3, when proxy mode is enabled, allows remote attackers to create or overwrite arbitrary files via directory traversal sequences in a Proxy Granting Ticket IOU (PGTiou) parameter. |
Risk And Classification
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
LowAuthentication
NoneConfidentiality
NoneIntegrity
PartialAvailability
PartialAV:N/AC:L/Au:N/C:N/I:P/A:P
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Apereo | Phpcas | 0.2 | All | All | All |
| Application | Apereo | Phpcas | 0.3 | All | All | All |
| Application | Apereo | Phpcas | 0.3.1 | All | All | All |
| Application | Apereo | Phpcas | 0.3.2 | All | All | All |
| Application | Apereo | Phpcas | 0.4 | All | All | All |
| Application | Apereo | Phpcas | 0.4.1 | All | All | All |
| Application | Apereo | Phpcas | 0.4.10 | All | All | All |
| Application | Apereo | Phpcas | 0.4.11 | All | All | All |
| Application | Apereo | Phpcas | 0.4.12 | All | All | All |
| Application | Apereo | Phpcas | 0.4.13 | All | All | All |
| Application | Apereo | Phpcas | 0.4.14 | All | All | All |
| Application | Apereo | Phpcas | 0.4.15 | All | All | All |
| Application | Apereo | Phpcas | 0.4.16 | All | All | All |
| Application | Apereo | Phpcas | 0.4.17 | All | All | All |
| Application | Apereo | Phpcas | 0.4.18 | All | All | All |
| Application | Apereo | Phpcas | 0.4.19 | All | All | All |
| Application | Apereo | Phpcas | 0.4.20 | All | All | All |
| Application | Apereo | Phpcas | 0.4.21 | All | All | All |
| Application | Apereo | Phpcas | 0.4.22 | All | All | All |
| Application | Apereo | Phpcas | 0.4.23 | All | All | All |
| Application | Apereo | Phpcas | 0.4.8 | All | All | All |
| Application | Apereo | Phpcas | 0.4.9 | All | All | All |
| Application | Apereo | Phpcas | 0.5.0 | All | All | All |
| Application | Apereo | Phpcas | 0.5.1 | All | All | All |
| Application | Apereo | Phpcas | 0.6.0 | All | All | All |
| Application | Apereo | Phpcas | 1.0.0 | All | All | All |
| Application | Apereo | Phpcas | 1.0.1 | All | All | All |
| Application | Apereo | Phpcas | 1.1.0 | All | All | All |
| Application | Apereo | Phpcas | 1.1.1 | All | All | All |
| Application | Apereo | Phpcas | All | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| [SECURITY] Fedora 13 Update: glpi-0.72.4-3.svn11497.fc13 | af854a3a-2127-422b-91ae-364da2661108 | lists.fedoraproject.org | |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | |
| #495542 - ITP: php-cas -- Central Authentication Service client library in php - Debian Bug report logs | af854a3a-2127-422b-91ae-364da2661108 | bugs.debian.org | |
| [SECURITY] Fedora 13 Update: php-pear-CAS-1.1.3-1.fc13 | af854a3a-2127-422b-91ae-364da2661108 | lists.fedoraproject.org | |
| forge.indepnet.net/projects/glpi/repository/revisions/12601 | af854a3a-2127-422b-91ae-364da2661108 | forge.indepnet.net | |
| oss-security - Re: CVE request - phpCAS: prevent symlink attacks, directory traversal and XSS during a proxy callback | af854a3a-2127-422b-91ae-364da2661108 | www.openwall.com | |
| oss-security - Re: CVE request - phpCAS: prevent symlink attacks, directory traversal and XSS during a proxy callback | af854a3a-2127-422b-91ae-364da2661108 | www.openwall.com | |
| Debian update for moodle - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| phpCAS Proxy Mode Multiple Security Vulnerabilities | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| Debian -- Security Information -- DSA-2172-1 moodle | af854a3a-2127-422b-91ae-364da2661108 | www.debian.org | |
| GLPI phpCAS Multiple Vulnerabilities - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | |
| oss-security - CVE request - phpCAS: prevent symlink attacks, directory traversal and XSS during a proxy callback | af854a3a-2127-422b-91ae-364da2661108 | www.openwall.com | |
| [PHPCAS-80] Proxy tickets and writing on disk needs more checks - Jira | af854a3a-2127-422b-91ae-364da2661108 | issues.jasig.org | |
| Fedora update for php-pear-CAS - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| [SECURITY] Fedora 12 Update: glpi-0.72.4-3.svn11497.fc12 | af854a3a-2127-422b-91ae-364da2661108 | lists.fedoraproject.org | |
| [SECURITY] Fedora 12 Update: php-pear-CAS-1.1.3-1.fc12 | af854a3a-2127-422b-91ae-364da2661108 | lists.fedoraproject.org | |
| FishEye: changeset 21538 | af854a3a-2127-422b-91ae-364da2661108 | developer.jasig.org | |
| Fedora update for glpi - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.