Overview
This is the initial version of an Apereo CAS project vulnerability disclosure, describing an issue in CAS that affects the security and cypto operations of the authentication webflow states.
Affected Deployments
The attack vector applies to deployments of the CAS server for the following versions:
- 5.3.x
- 6.0.x
- 6.1.x
Severity
Details will be posted here publicly once the grace period has passed.
Severity is considered low, though it is recommended that upgrades be carried out to removes any chances of security breaches.
Patching
Patch releases are available to address CAS deployments. Upgrades to the next patch version for each release should be a drop-in replacement.
Timeline
The issue was originally reported privately via a direct email on January 21st, 2020 and upon confirmation, CAS was patched on February 7th, 2020.
Procedure
5.3.x
Modify your CAS overlay to point to version 5.3.15.1
, when released. A snippet of a pom.xml
for a CAS overlay follows:
<properties>
<cas.version>5.3.15.1</cas.version>
</properties>
6.0.x
Modify your CAS overlay to point to the version 6.0.8.1
, when released. A snippet of a gradle.properties
for a CAS overlay follows:
cas.version=6.0.8.1
6.1.x
Modify your CAS overlay to point to the version 6.1.5
, when released. A snippet of a gradle.properties
for a CAS overlay follows:
cas.version=6.1.5
6.2.x
Modify your CAS overlay to point to the version 6.2.0-RC3
, when released. A snippet of a gradle.properties
for a CAS overlay follows:
cas.version=6.2.0-RC3
Support
CAS is Apache v2 open source software under the sponsorship of the Apereo Foundation, supported by community volunteers and enthusiasts. Support options may be found here.
Resources
On behalf of the CAS Application Security working group,