Improper Authentication vulnerability in Apereo CAS in jakarta.servlet.http.HttpServletRequest.getRemoteAddr method allows Multi-Factor Authentication bypass.This issue affects CAS: through 7.0.0-RC7. It is unknown whether in new versions the issue will be fixed. For the date of publication there is no patch, and the vendor does not treat it as a vulnerability.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Central_authentication_service | Apereo | * | 7.0.0 (excluding) |
Central_authentication_service | Apereo | 7.0.0-rc1 (including) | 7.0.0-rc1 (including) |
Central_authentication_service | Apereo | 7.0.0-rc2 (including) | 7.0.0-rc2 (including) |
Central_authentication_service | Apereo | 7.0.0-rc3 (including) | 7.0.0-rc3 (including) |
Central_authentication_service | Apereo | 7.0.0-rc4 (including) | 7.0.0-rc4 (including) |
Central_authentication_service | Apereo | 7.0.0-rc5 (including) | 7.0.0-rc5 (including) |
Central_authentication_service | Apereo | 7.0.0-rc6 (including) | 7.0.0-rc6 (including) |
Central_authentication_service | Apereo | 7.0.0-rc7 (including) | 7.0.0-rc7 (including) |