CVE-2014-4172:
Jasig Java CAS Client, .NET CAS Client, and phpCAS contain URL parameter injection vulnerability
9.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.90824%
CWE
Published
5/17/2022
Updated
4/12/2024
KEV Status
No
Technology
C#
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
DotNetCasClient | nuget | < 1.0.2 | 1.0.2 |
org.jasig.cas:cas-client | maven | < 3.3.2 | 3.3.2 |
jasig/phpcas | composer | < 1.3.3 | 1.3.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper URL encoding of user-controlled parameters during CAS ticket validation()
. The CVE description explicitly identifies two injection points: (1) the 'service' parameter in AbstractUrlBasedTicketValidator.java
and (2) the 'pgtUrl' parameter in Cas20ServiceTicketValidator.java
. Commit diffs (ae37092, f0e0300, #125) confirm these parameters were added to URLs without proper encoding, allowing attackers to inject arbitrary parameters. The .NET and PHP
clients had analogous flaws in their ticket validation()
URL construction. All identified functions directly handle these parameters without adequate sanitization, matching the CWE-74 injection pattern described.