Skip to content

Commit 2ab0bda

Browse files
authored
Update 2024-05-18-oauth-vuln.md
1 parent 7be6dea commit 2ab0bda

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

_posts/cas/2024-05-18-oauth-vuln.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ If you or your institution is a member of the Apereo foundation with an active s
3333

3434
# Severity
3535

36-
CAS presnts the ability to pin the single sign-on cookie to an authentication session that typically linked to the user's environment such as the browser user agent or the IP address. This behavior would, for example, prevent the single sign-on session to be recognized and accepted if the user's IP address changes between authentication attempts. However, this behavior was not corrected handled for OpenID Connect authentication requests and cookie session-pinning was effectively bypassed.
36+
CAS presnts the ability to pin the single sign-on cookie to an authentication session that typically is linked to the user's environment such as the browser user agent or the IP address. This behavior would, for example, prevent the single sign-on session to be recognized and accepted if the user's IP address changes between authentication attempts. However, this behavior was not correctly handled for OpenID Connect authentication requests and cookie session-pinning was effectively bypassed.
3737

3838
Session pinning is typically controlled via:
3939

@@ -77,4 +77,4 @@ If you or your institution is a **member** of the Apereo foundation with an **ac
7777

7878
On behalf of the CAS Application Security working group,
7979

80-
[Misagh Moayyed](https://fawnoos.com)
80+
[Misagh Moayyed](https://fawnoos.com)

0 commit comments

Comments
 (0)