phpCAS before 1.1.2 allows remote authenticated users to hijack sessions via a query string containing a crafted ticket value.Referenceshttp://www.debian.org/security/2011/dsa-2172http://www.vupen.com/english/advisories/2011/0456http://secunia.com/advisories/41240http://secunia.com/advisories/40845http://lists.fedoraproject.org/pipermail/package-announce/2010-August/046576.htmlhttps://exchange.xforce.ibmcloud.com/vulnerabilities/60894https://issues.jasig.org/browse/PHPCAS-61http://www.vupen.com/english/advisories/2010/2909https://wiki.jasig.org/display/CASC/phpCAS+ChangeLoghttp://www.vupen.com/english/advisories/2010/2261http://secunia.com/advisories/42149https://forge.indepnet.net/projects/glpi/repository/revisions/12601http://lists.fedoraproject.org/pipermail/package-announce/2010-August/046584.htmlhttp://secunia.com/advisories/43427http://www.securityfocus.com/bid/42162http://www.vupen.com/english/advisories/2010/2234http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050428.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2010-November/050415.htmlhttp://secunia.com/advisories/42184