Skip to content

Commit 8bd16ef

Browse files
committed
update post
1 parent 79e0150 commit 8bd16ef

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

_posts/cas/2024-06-26-oidc-vuln.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ If you or your institution is a member of the Apereo foundation with an active s
3333

3434
# Severity
3535

36-
Details will be made public once the [security grace period](https://apereo.github.io/cas/developer/Sec-Vuln-Response.html) has passed.
36+
If your CAS server is functioning as an OAuth or OpenID Connect identity provider **AND** you have configured the system to create and share **access tokens as JWTs**, you are affected by this issue, which mistakenly allows CAS to ignore the attribute/claim release policies assigned to the application definition and to release all possible claims to the application as part of the JWT access token. The patch releases listed below should help CAS re-evaluate the claim release policy of the application before building and sharing a JWT access token. There are also smaller measures in place to ensure CAS selects the correct *indexed* service definition during request processing, particularly if and when the service definition record is modified dynamically at runtime.
3737

3838
# Timeline
3939

0 commit comments

Comments
 (0)