Normally, only registered service urls are allowed to use Cas. Cas
logout is initiated from these applications. So how can an attacker
inject a malicious logout redirect URL?

The present discussion isn't focused on registered apps behaving badly.
On the contrary, it's about the crafting of a link by some other third
party which takes you to a trusted page (CAS logout), yet presents a
presumably innocuous link that is actually malicious.  We've identified
two flavors of malicious:

 1. Execution of javascript upon clicking.
 2. A link to a superficially safe site that is actually malicious.

Does the same problem apply for the service parameter on logout?

The present discussion only applies to that parameter, which is called
"url."

M

--
You are currently subscribed to [email protected] as: 
[email protected]
To unsubscribe, change settings or access archives, see 
http://www.ja-sig.org/wiki/display/JSG/cas-user

Reply via email to