Skip to content

Commit b96e158

Browse files
committed
new post
1 parent 1c38c8a commit b96e158

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

_posts/cas/2023-09-14-oauth-vuln.md

+4-4
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ tags: [CAS]
77

88
# Overview
99

10-
This is the initial [Apereo CAS project vulnerability disclosure](https://apereo.github.io/cas/developer/Sec-Vuln-Response.html),
10+
This is an [Apereo CAS project vulnerability disclosure](https://apereo.github.io/cas/developer/Sec-Vuln-Response.html),
1111
describing an issue in CAS acting as an OAuth/OpenID Connect provider. If your CAS server is not acting as an OAuth/OpenID Connect provider producing claims and attributes, there is nothing for you to do here. Keep calm and carry on.
1212

1313
For additional details on how security issues, patches and announcements are handled, please read the [Apereo CAS project vulnerability disclosure](https://apereo.github.io/cas/developer/Sec-Vuln-Response.html) process.
@@ -33,7 +33,9 @@ If you or your institution is a member of the Apereo foundation with an active s
3333

3434
# Severity
3535

36-
This is the initial version of an [Apereo CAS project vulnerability disclosure](https://apereo.github.io/cas/developer/Sec-Vuln-Response.html). This post will be updated once the security grace period has passed.
36+
CAS incorrectly returns and releases a number of internal data structures and attributes in response to OAuth or OpenID Connect requests sent to the *User Profile* endpoint. Such internal data structures often tend to contain sensitive data such as the application policy record, details and metadata describing the authentication attempt, client secret assigned to the relying party, geo-location details when activated and more in plain JSON.
37+
38+
This mistake is corrected in the patch releases described below.
3739

3840
# Timeline
3941

@@ -45,8 +47,6 @@ Patch releases are available to address CAS deployments. Upgrades to the next pa
4547

4648
## Procedure
4749

48-
This is the initial version of an [Apereo CAS project vulnerability disclosure](https://apereo.github.io/cas/developer/Sec-Vuln-Response.html). All source code and repository tags that contain fixes for this issue are kept privately until the grace period has passed. Note that repository tags are generally irrelevant when it comes to applying fixes described below, unless you intend to build the CAS codebase from source and a tagged commit instead of relying on a binary published release.
49-
5050
### 6.5.x
5151

5252
Modify your CAS overlay to point to the version `6.5.9.4`.

0 commit comments

Comments
 (0)