phpCAS Session Hijacking and Cross-Site Scripting Vulnerabilities

Summary
This host is installed with phpCAS and is prone to session hijacking and cross-site scripting vulnerabilities.
Impact
Successful exploitation will allow remote attackers to execute arbitrary HTML and script code in a user's browser session in the context of an affected site and to hijack another user's account and gain the victims privileges. Impact Level: Application.
Solution
Upgrade to phpCAS version 1.1.2 or later, For updates refer to https://wiki.jasig.org/display/CASC/phpCAS
Insight
The flaw exists due to: - improper validation of service tickets prior to assigning the new session. This can be exploited to hijack another user's session by guessing valid service tickets. - improper validation of the callback URL.
Affected
phpCAS version prior to 1.1.2
References