Ce mail provient de l'extérieur, restons vigilants

=====================================================================

                            CERT-Renater

                Note d'Information No. 2025/VULN648
_____________________________________________________________________

DATE                : 29/09/2025

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running Apereo CAS server versions prior
                                 to 7.1.6.2, 7.2.7.

=====================================================================
https://apereo.github.io/2025/09/25/oauth-oidc-vuln/
_____________________________________________________________________


CAS OAuth/OpenID Connect Vulnerability Disclosure
Thursday, Sep 25, 2025
2 minute read
Overview

This is the initial Apereo CAS project vulnerability disclosure,
describing an issue in CAS acting as an OAuth/OpenID Connect provider.

For additional details on how security issues, patches and
announcements are handled, please read the Apereo CAS project
vulnerability disclosure process.


Credits

This issue was originally reported by Luca Famà and was later
corroborated by the team at Coop (Switzerland), namely Artur
Stoecklin and David Roth. The group was kind enough to thoroughly
investigate the issue, discuss the problem in detail, provide steps
to reproduce the problem and offer insight to diagnose the root
cause.

Thank you everyone!


Affected Deployments

The problem addressed here, per the CAS maintenance policy, affects
the Apereo CAS server for the following versions:

- 7.1.x
- 7.2.x

If your CAS version is not listed above AND is still part of an active
maintenance cycle per the CAS maintenance policy, then best effort
(analysis or confirmation from reporters/testers) indicates that the
version is not affected by this issue. That said, please note that per
the project’s Apache2 license, software distributed under the License
is distributed on an “AS IS” BASIS, WITHOUT WARRANTIES OR CONDITIONS
OF ANY KIND, either express or implied. For additional information,
please see the project license.

If you or your institution is a member of the Apereo foundation with
an active support subscription supporting the CAS project, please
contact the CAS subs working group to learn more about this security
vulnerability report.


Severity

You are effected by this security vulnerability if your CAS deployment
is acting as an OAuth/OpenID Connect identity provider. Additional
details about the nature of the vulnerability will be made public
once the security grace period has passed.

If your deployment does not pass the noted condition(s) above, there
is nothing for you to do here. Keep calm and carry on.


Timeline

The issue was originally reported on September 17th, 2025 and upon
confirmation, CAS releases were patched and eventually published on
September 25th, 2025.


Patching

Patch releases are available to address CAS deployments. Upgrades
to the next patch version for each release should be a drop-in
replacement.


Affected Versions
7.1.x

Modify your CAS overlay to point to the version 7.1.6.2.
7.2.x

Modify your CAS overlay to point to the version 7.2.7.
How to upgrade

    Locate your gradle.properties file in your CAS overlay, found
at the root of the project.
    Modify your CAS version to point to the approriate release by
updating the cas.version property.
    Follow the instructions in the README.md file to build the
server.


Support

Apereo CAS is Apache v2 open source software under the sponsorship
of the Apereo Foundation. Support options may be found here.

If you or your institution is a member of the Apereo foundation
with an active CAS subscription supporting the CAS project, please
contact the CAS subs working group to learn more about this
security vulnerability.


Resources

    CAS Security Vulnerability Response Model
    CAS Maintenance Policy
    CAS Mailing Lists

On behalf of the CAS Application Security working group,

Misagh Moayyed


=========================================================
+ CERT-RENATER        |    tel : 01-53-94-20-44         +
+ 23/25 Rue Daviel    |    fax : 01-53-94-20-41         +
+ 75013 Paris         |   email:cert@support.renater.fr +
=========================================================
