Skip to content

Commit

Permalink
update post
Browse files Browse the repository at this point in the history
  • Loading branch information
mmoayyed committed Jul 12, 2024
1 parent 79e0150 commit 8bd16ef
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion _posts/cas/2024-06-26-oidc-vuln.md
Original file line number Diff line number Diff line change
Expand Up @@ -33,7 +33,7 @@ If you or your institution is a member of the Apereo foundation with an active s

# Severity

Details will be made public once the [security grace period](https://apereo.github.io/cas/developer/Sec-Vuln-Response.html) has passed.
If your CAS server is functioning as an OAuth or OpenID Connect identity provider **AND** you have configured the system to create and share **access tokens as JWTs**, you are affected by this issue, which mistakenly allows CAS to ignore the attribute/claim release policies assigned to the application definition and to release all possible claims to the application as part of the JWT access token. The patch releases listed below should help CAS re-evaluate the claim release policy of the application before building and sharing a JWT access token. There are also smaller measures in place to ensure CAS selects the correct *indexed* service definition during request processing, particularly if and when the service definition record is modified dynamically at runtime.

# Timeline

Expand Down

0 comments on commit 8bd16ef

Please sign in to comment.