The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade apereo/phpcas
to version 1.6.0 or higher.
apereo/phpcas is a simple API for authenticating users against a CAS server
Affected versions of this package are vulnerable to Access Restriction Bypass in HTTP hostname discovery validation. An attacker can control the host header and use a valid ticket granted for any authorized service in the same SSO realm (CAS server) to authenticate. This could allow the attacker to access a user's account on a vulnerable CASified service without the user's knowledge, when the user visits the attacker's website while being logged in to the same CAS server.
This vulnerability can be avoided by ensuring the following setup:
phpCAS::setUrl()
is called and phpCAS::setCallbackURL()
is called, only when the proxy mode is enabled.OR
X-Forwarded-Host
, X-Forwarded-Server
, Host
, X-Forwarded-Proto
, and X-Forwarded-Protocol
is sanitized before reaching PHPAdditionally, if your CAS server service registry is configured to only allow known and trusted service URLs the severity of the vulnerability is reduced substantially since an attacker must be in control of another authorized service.