CVE-2024-11209
- EPSS 0.21%
- Veröffentlicht 14.11.2024 14:15:18
- Zuletzt bearbeitet 19.11.2024 19:14:26
A vulnerability was found in Apereo CAS 6.6. It has been classified as critical. This affects an unknown part of the file /login?service of the component 2FA. The manipulation leads to improper authentication. It is possible to initiate the attack re...
CVE-2024-11208
- EPSS 0.21%
- Veröffentlicht 14.11.2024 14:15:17
- Zuletzt bearbeitet 19.11.2024 19:38:51
A vulnerability was found in Apereo CAS 6.6 and classified as problematic. Affected by this issue is some unknown functionality of the file /login?service. The manipulation leads to session expiration. The attack may be launched remotely. The complex...
CVE-2024-4399
- EPSS 24.47%
- Veröffentlicht 23.05.2024 06:15:11
- Zuletzt bearbeitet 30.06.2025 18:44:29
The does not validate a parameter before making a request to it, which could allow unauthenticated users to perform SSRF attack
CVE-2023-4612
- EPSS 0.04%
- Veröffentlicht 09.11.2023 14:15:08
- Zuletzt bearbeitet 26.02.2025 22:15:11
Improper Authentication vulnerability in Apereo CAS in jakarta.servlet.http.HttpServletRequest.getRemoteAddr method allows Multi-Factor Authentication bypass.This issue affects CAS: through 7.0.0-RC7. It is unknown whether in new versions the issue w...
CVE-2023-28857
- EPSS 0.18%
- Veröffentlicht 27.06.2023 18:15:13
- Zuletzt bearbeitet 21.11.2024 07:56:10
Apereo CAS is an open source multilingual single sign-on solution for the web. Apereo CAS can be configured to use authentication based on client X509 certificates. These certificates can be provided via TLS handshake or a special HTTP header, such a...
CVE-2021-42567
- EPSS 67.96%
- Veröffentlicht 07.12.2021 22:15:06
- Zuletzt bearbeitet 21.11.2024 06:27:49
Apereo CAS through 6.4.1 allows XSS via POST requests sent to the REST API endpoints.
CVE-2020-27178
- EPSS 0.23%
- Veröffentlicht 16.10.2020 16:15:11
- Zuletzt bearbeitet 21.11.2024 05:20:49
Apereo CAS 5.3.x before 5.3.16, 6.x before 6.1.7.2, 6.2.x before 6.2.4, and 6.3.x before 6.3.0-RC4 mishandles secret keys with Google Authenticator for multifactor authentication.
CVE-2019-10754
- EPSS 0.42%
- Veröffentlicht 23.09.2019 23:15:10
- Zuletzt bearbeitet 21.11.2024 04:19:51
Multiple classes used within Apereo CAS before release 6.1.0-RC5 makes use of apache commons-lang3 RandomStringUtils for token and ID generation which makes them predictable due to RandomStringUtils PRNG's algorithm not being cryptographically strong...
CVE-2015-1169
- EPSS 0.61%
- Veröffentlicht 10.02.2015 20:59:01
- Zuletzt bearbeitet 12.04.2025 10:46:40
Apereo Central Authentication Service (CAS) Server before 3.5.3 allows remote attackers to conduct LDAP injection attacks via a crafted username, as demonstrated by using a wildcard and a valid password to bypass LDAP authentication.