phpCAS before 1.1.2 allows remote authenticated users to hijack sessions via a query string containing a crafted ticket value.
https://wiki.jasig.org/display/CASC/phpCAS+ChangeLog
https://issues.jasig.org/browse/PHPCAS-61
https://forge.indepnet.net/projects/glpi/repository/revisions/12601
https://exchange.xforce.ibmcloud.com/vulnerabilities/60894
http://www.vupen.com/english/advisories/2011/0456
http://www.vupen.com/english/advisories/2010/2909
http://www.vupen.com/english/advisories/2010/2261
http://www.vupen.com/english/advisories/2010/2234
http://www.securityfocus.com/bid/42162
http://www.debian.org/security/2011/dsa-2172
http://secunia.com/advisories/43427
http://secunia.com/advisories/42184
http://secunia.com/advisories/42149
http://secunia.com/advisories/41240
http://secunia.com/advisories/40845
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050428.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050415.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-August/046584.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-August/046576.html