CAS Vulnerability Disclosure


Overview

This is the initial version of an Apereo CAS project vulnerability disclosure, describing an issue in CAS that affects handling Google Authenticator accounts for multifactor authentication. If you are not using Google Authenticator for multifactor authentication there is nothing to do here. Keep calm and carry on.

For additional details on how security issues, patches and announcements are handled, please read the Apereo CAS project vulnerability disclosure process.

Affected Deployments

The security issue described here, per the CAS maintenance policy, affects the Apereo CAS server for the following versions:

- 6.2.x
- 6.3.x

If your CAS version is not listed above and is still part of an active maintenance cycle per the CAS maintenance policy, then best effort (analysis or confirmation from reporters/testers) indicates that the version is not affected by this issue. That said, please note that per the project’s Apache2 license, software distributed under the License is distributed on an “AS IS” BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.. For additional information, please see the project license.

If you or your institution is a member of the Apereo foundation with an active support subscription supporting the CAS project, please contact the CAS subs working group to learn more about this security vulnerability report.

Severity

The underlying issue allows the adversary to bypass the Google Authenticator 2FA mechanism, by using a mixture of uppercase and lowercase characters in the username, having compromised the user account in the first place. The component abstractions that are responsible for locating user records with Google Authenticator tend to execute search queries in a case-sensitive manner. If the given username contains mixed characters and primary authentication (such as LDAP) allows for case-insensitive usernames, the repository component in the 2FA step might fail to locate the proper user record, and in turn might ask the user/adversary to enroll their own device and log in.

It is recommended that upgrades be carried out to removes any chances of security breaches. This post will be updated with additional details once the grace period has passed.

Timeline

The issue was originally reported on February 9th, 2021 and upon confirmation, CAS releases were patched on February 10th, 2021 and released on February 13th, 2021.

Patching

Big thanks to Linos Giannopoulos for reporting this issue, supplying a patch to fix the issue and working with the security team to test and discuss the fix.

Patch releases are available to address CAS deployments. Upgrades to the next patch version for each release should be a drop-in replacement.

Procedure

6.2.x

Modify your CAS overlay to point to the version 6.2.8.

6.3.x

Modify your CAS overlay to point to the version 6.3.2.

Support

Apereo CAS is Apache v2 open source software under the sponsorship of the Apereo Foundation, supported by community volunteers and enthusiasts. Support options may be found here.

If you or your institution is a member of the Apereo foundation with an active subscription supporting the CAS project, please contact the CAS subs working group to learn more about this security vulnerability report.

Resources

On behalf of the CAS Application Security working group,

Misagh Moayyed

Related Posts

CAS Vulnerability Disclosure

Disclosure of a security issue with the CAS software.

CAS Multifactor Authentication with U2F and Bypass

A short walkthrough to demonstrate how one might turn on multifactor authentication with CAS using U2F and default bypass rule.

CAS Vulnerability Disclosure

Disclosure of a security issue with the CAS software.

CAS Release Notes Moved

CAS Release Notes are moved to the CAS site.

CAS 6.2.0 RC5 Feature Release

...in which I present an overview of CAS 6.2.0 RC5 release.

CAS 6.2.0 RC4 Feature Release

...in which I present an overview of CAS 6.2.0 RC4 release.

CAS 6.2.0 RC3 Feature Release

...in which I present an overview of CAS 6.2.0 RC3 release.

Apereo CAS - Bootiful CAS Client

Easy to use CAS Client

CAS Vulnerability Disclosure

Disclosure of a security issue with the CAS software.

Checking Out Pull Requests Locally

Check out GitHub pull requests as local branches using a simple bash function.