Critical phpCAS Authentication Bypass Advisory in Ubuntu Security Notice USN-6913-1
Summary
A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS Summary: phpCAS was vulnerable to an authentication bypass. Software Description: - php-cas: Central Authentication Service client library in php Details: Filip Hejsek discovered that phpCAS was using HTTP headers to determine the service URL used to validate tickets. A remote attacker could possibly use this issue to gain access to a victim's account on a vulnerable CASified service. This security update introduces an incompatible API change. After applying this update, third party applications need to be modified to pass in an additional service base URL argument when constructing the client class. For more information please refer to the section "Upgrading 1.5.0 -> 1.6.0" of the phpCAS upgrading document: https://github.com/apereo/phpCAS/blob/master/docs/Upgrading
Update Instructions
The problem can be corrected by updating your system to the following package versions: Ubuntu 22.04 LTS php-cas 1.3.8-1ubuntu0.22.04.1 Ubuntu 20.04 LTS php-cas 1.3.8-1ubuntu0.20.04.1 In general, a standard system update will make all the necessary changes.
References
https://ubuntu.com/security/notices/USN-6913-1
CVE-2022-39369
Package Information
https://launchpad.net/ubuntu/+source/php-cas/1.3.8-1ubuntu0.22.04.1 https://launchpad.net/ubuntu/+source/php-cas/1.3.8-1ubuntu0.20.04.1