Vulnerabilities > CVE-2012-5583 - Cryptographic Issues vulnerability in Apereo PHPcas

047910
CVSS 5.8 - MEDIUM
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
NONE
network
apereo
CWE-310
nessus

Summary

phpCAS before 1.3.2 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

Common Weakness Enumeration (CWE)

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.

Nessus

  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2012-21106.NASL
    descriptionChanges in version 1.3.2 Security Fixes : - CVE-2012-5583 Missing CN validation of CAS server certificate [#58] (Joachim Fritschi) Bug Fixes : - Fix broken character encoding in Greek and French [#40] (Joachim Fritschi) - Minor error corrections in a few example files [] (Joachim Fritschi) - Remove erroneous break statement [#44] (jbittel) - Use X-Forwarded-Port [#45] (Andrew Kirkpatrick) - Stop autoloader using set_include_path [#51/#52] (drysdaleb) - Fix undefined property in the rebroadcast code [#47] (Joachim Fritschi) Improvement : - Enable getCookies on a proxied sevices [#56] (Adam Franco) Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2013-01-10
    plugin id63459
    published2013-01-10
    reporterThis script is Copyright (C) 2013-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/63459
    titleFedora 17 : php-pear-CAS-1.3.2-1.fc17 (2012-21106)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Fedora Security Advisory 2012-21106.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(63459);
      script_version("1.10");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/03/12");
    
      script_bugtraq_id(56680);
      script_xref(name:"FEDORA", value:"2012-21106");
    
      script_name(english:"Fedora 17 : php-pear-CAS-1.3.2-1.fc17 (2012-21106)");
      script_summary(english:"Checks rpm output for the updated package.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Fedora host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Changes in version 1.3.2
    
    Security Fixes :
    
      - CVE-2012-5583 Missing CN validation of CAS server
        certificate [#58] (Joachim Fritschi)
    
    Bug Fixes :
    
      - Fix broken character encoding in Greek and French [#40]
        (Joachim Fritschi)
    
        - Minor error corrections in a few example files []
          (Joachim Fritschi)
    
        - Remove erroneous break statement [#44] (jbittel)
    
        - Use X-Forwarded-Port [#45] (Andrew Kirkpatrick)
    
        - Stop autoloader using set_include_path [#51/#52]
          (drysdaleb)
    
        - Fix undefined property in the rebroadcast code [#47]
          (Joachim Fritschi)
    
    Improvement :
    
      - Enable getCookies on a proxied sevices [#56] (Adam
        Franco)
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Fedora security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      # https://lists.fedoraproject.org/pipermail/package-announce/2013-January/095493.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?26618923"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected php-pear-CAS package."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:php-pear-CAS");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:17");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2012/12/31");
      script_set_attribute(attribute:"plugin_publication_date", value:"2013/01/10");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2013-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Fedora Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
    os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
    os_ver = os_ver[1];
    if (! ereg(pattern:"^17([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 17.x", "Fedora " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
    
    flag = 0;
    if (rpm_check(release:"FC17", reference:"php-pear-CAS-1.3.2-1.fc17")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
      else security_warning(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "php-pear-CAS");
    }
    
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2012-21084.NASL
    descriptionChanges in version 1.3.2 Security Fixes : - CVE-2012-5583 Missing CN validation of CAS server certificate [#58] (Joachim Fritschi) Bug Fixes : - Fix broken character encoding in Greek and French [#40] (Joachim Fritschi) - Minor error corrections in a few example files [] (Joachim Fritschi) - Remove erroneous break statement [#44] (jbittel) - Use X-Forwarded-Port [#45] (Andrew Kirkpatrick) - Stop autoloader using set_include_path [#51/#52] (drysdaleb) - Fix undefined property in the rebroadcast code [#47] (Joachim Fritschi) Improvement : - Enable getCookies on a proxied sevices [#56] (Adam Franco) Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2013-01-14
    plugin id63501
    published2013-01-14
    reporterThis script is Copyright (C) 2013-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/63501
    titleFedora 18 : php-pear-CAS-1.3.2-1.fc18 (2012-21084)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2012-21122.NASL
    descriptionChanges in version 1.3.2 Security Fixes : - CVE-2012-5583 Missing CN validation of CAS server certificate [#58] (Joachim Fritschi) Bug Fixes : - Fix broken character encoding in Greek and French [#40] (Joachim Fritschi) - Minor error corrections in a few example files [] (Joachim Fritschi) - Remove erroneous break statement [#44] (jbittel) - Use X-Forwarded-Port [#45] (Andrew Kirkpatrick) - Stop autoloader using set_include_path [#51/#52] (drysdaleb) - Fix undefined property in the rebroadcast code [#47] (Joachim Fritschi) Improvement : - Enable getCookies on a proxied sevices [#56] (Adam Franco) Changes in version 1.3.1 Bug Fixes : - Readd PEAR support to the package [#30] (Joachim Fritschi) - fix a __autoload conflicts in the autoloader [#36] (Joachim Fritschi) - fix PEAR code style errors [25] (Joachim Fritschi) - properly unset variables during checkAuthenticate[#35] (Joachim Fritschi) Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2013-01-10
    plugin id63460
    published2013-01-10
    reporterThis script is Copyright (C) 2013-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/63460
    titleFedora 16 : php-pear-CAS-1.3.2-1.fc16 (2012-21122)