Apereo CAS 4.X反序列化漏洞应急

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

# CAS Vulnerability Disclosure Friday, Apr 8, 2016 10 minute read # Remember This post is **NOT** new. I am just collecting it here so it’s publicly available. This was originally published as a secret gist on Github in April 2016. # Overview This is an Apereo CAS project vulnerability disclosure, describing an issue in CAS’s attempts to deserialize objects via the Apache Commons Collections library. # Affected Deployments The attack vector specifically applies to all deployments of CAS `v4.1.x` and `v4.2.x` deployments where the out-of-the-box default configuration of CAS is used for managing object serialization, encryption and signing of data. You are **NOT** affected by this issue, if: - You have deployed a different CAS version, lower than `v4.1.0`. - You have deployed CAS `v4.1.x` or `v4.2.x`, **BUT** you have removed the default CAS configuration for encryption/signing and have regenerated the appropriate settings for your own deployment. Exploiting the vulnerability hinges...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息