Normally, only registered service urls are allowed to use Cas. Cas logout is initiated from these applications. So how can an attacker inject a malicious logout redirect URL?
The present discussion isn't focused on registered apps behaving badly. On the contrary, it's about the crafting of a link by some other third party which takes you to a trusted page (CAS logout), yet presents a presumably innocuous link that is actually malicious. We've identified two flavors of malicious: 1. Execution of javascript upon clicking. 2. A link to a superficially safe site that is actually malicious.
Does the same problem apply for the service parameter on logout?
The present discussion only applies to that parameter, which is called "url." M -- You are currently subscribed to [email protected] as: [email protected] To unsubscribe, change settings or access archives, see http://www.ja-sig.org/wiki/display/JSG/cas-user
