A vulnerability was found in Apereo CAS 6.6 and classified as problematic. Affected by this issue is some unknown functionality of the file /login?service. The manipulation leads to session expiration. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link | Resource |
---|---|
https://gist.github.com/0xArthurSouza/ce3b89887b03cc899d5e8cb6e472b04e | Exploit Third Party Advisory |
https://ibb.co/1LxSK2k | Exploit |
https://vuldb.com/?ctiid.284522 | Permissions Required |
https://vuldb.com/?id.284522 | Third Party Advisory |
https://vuldb.com/?submit.437211 | Third Party Advisory |
Configurations
History
19 Nov 2024, 19:38
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:apereo:central_authentication_service:6.6.0:-:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : 2.6
v3 : 8.1 |
First Time |
Apereo
Apereo central Authentication Service |
|
References | () https://gist.github.com/0xArthurSouza/ce3b89887b03cc899d5e8cb6e472b04e - Exploit, Third Party Advisory | |
References | () https://ibb.co/1LxSK2k - Exploit | |
References | () https://vuldb.com/?ctiid.284522 - Permissions Required | |
References | () https://vuldb.com/?id.284522 - Third Party Advisory | |
References | () https://vuldb.com/?submit.437211 - Third Party Advisory |
15 Nov 2024, 13:58
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
14 Nov 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-14 14:15
Updated : 2024-11-19 19:38
NVD link : CVE-2024-11208
Mitre link : CVE-2024-11208
CVE.ORG link : CVE-2024-11208
JSON object : View
Products Affected
apereo
- central_authentication_service
CWE
CWE-613
Insufficient Session Expiration