Joachim Fritschi (upstream phpCAS developer) noticed: [1] https://issues.jasig.org/browse/PHPCAS-67 the Central Authentication Service (CAS) client library improperly encoded the callback URLs (generated to validate service tickets) provided to CAS proxies. A remote attacker could use this flaw to conduct cross-site scripting (XSS) attacks by providing a specially-crafted value for service ticket. Upstream patch: [2] https://developer.jasig.org/source/changelog/jasigsvn/cas-clients/phpcas/trunk/source?cs=20823
This flaw affects the versions of the php-pear-CAS package, as shipped with Fedora release of 12 and 13. Please fix.
This issue affects the versions of the glpi package, as shipped with Fedora release of 12 and 13. Please fix.
This issue affects the versions of the moodle package, as shipped with Fedora release of 12 and 13. This issue affects the versions of the moodle package, as shipped within EPEL-4 and EPEL-5 repositories. Please fix.
Created php-pear-CAS tracking bugs for this issue Affects: fedora-all [bug 620753]
Created glpi tracking bugs for this issue Affects: fedora-all [bug 620759]
Created moodle tracking bugs for this issue Affects: fedora-all [bug 620772]
glpi is not affected as it (now) uses the system version of phpCas.