Apereo

Central Authentication Service

9 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.21%
  • Published 14.11.2024 14:15:18
  • Last modified 19.11.2024 19:14:26

A vulnerability was found in Apereo CAS 6.6. It has been classified as critical. This affects an unknown part of the file /login?service of the component 2FA. The manipulation leads to improper authentication. It is possible to initiate the attack re...

Exploit
  • EPSS 0.21%
  • Published 14.11.2024 14:15:17
  • Last modified 19.11.2024 19:38:51

A vulnerability was found in Apereo CAS 6.6 and classified as problematic. Affected by this issue is some unknown functionality of the file /login?service. The manipulation leads to session expiration. The attack may be launched remotely. The complex...

Exploit
  • EPSS 24.47%
  • Published 23.05.2024 06:15:11
  • Last modified 30.06.2025 18:44:29

The does not validate a parameter before making a request to it, which could allow unauthenticated users to perform SSRF attack

  • EPSS 0.04%
  • Published 09.11.2023 14:15:08
  • Last modified 26.02.2025 22:15:11

Improper Authentication vulnerability in Apereo CAS in jakarta.servlet.http.HttpServletRequest.getRemoteAddr method allows Multi-Factor Authentication bypass.This issue affects CAS: through 7.0.0-RC7. It is unknown whether in new versions the issue w...

  • EPSS 0.18%
  • Published 27.06.2023 18:15:13
  • Last modified 21.11.2024 07:56:10

Apereo CAS is an open source multilingual single sign-on solution for the web. Apereo CAS can be configured to use authentication based on client X509 certificates. These certificates can be provided via TLS handshake or a special HTTP header, such a...

  • EPSS 67.96%
  • Published 07.12.2021 22:15:06
  • Last modified 21.11.2024 06:27:49

Apereo CAS through 6.4.1 allows XSS via POST requests sent to the REST API endpoints.

  • EPSS 0.23%
  • Published 16.10.2020 16:15:11
  • Last modified 21.11.2024 05:20:49

Apereo CAS 5.3.x before 5.3.16, 6.x before 6.1.7.2, 6.2.x before 6.2.4, and 6.3.x before 6.3.0-RC4 mishandles secret keys with Google Authenticator for multifactor authentication.

Exploit
  • EPSS 0.42%
  • Published 23.09.2019 23:15:10
  • Last modified 21.11.2024 04:19:51

Multiple classes used within Apereo CAS before release 6.1.0-RC5 makes use of apache commons-lang3 RandomStringUtils for token and ID generation which makes them predictable due to RandomStringUtils PRNG's algorithm not being cryptographically strong...

Exploit
  • EPSS 0.61%
  • Published 10.02.2015 20:59:01
  • Last modified 12.04.2025 10:46:40

Apereo Central Authentication Service (CAS) Server before 3.5.3 allows remote attackers to conduct LDAP injection attacks via a crafted username, as demonstrated by using a wildcard and a valid password to bypass LDAP authentication.