GitHub Enterprise Server Vulnerability Allows Authentication Bypass
A critical vulnerability has been identified in GitHub Enterprise Server, posing significant security risks by allowing attackers to bypass authentication mechanisms.
This flaw, tracked as CVE-2024-9487, was discovered in the Security Assertion Markup Language (SAML) single sign-on (SSO) feature utilized by GitHub Enterprise Server.
The vulnerability specifically affects instances where the optional encrypted assertions feature is enabled, potentially enabling unauthorized user provisioning and access to the server instance.
The vulnerability stems from improper verification of cryptographic signatures, which could allow an attacker with direct network access and a signed SAML response or metadata document to forge a SAML response.
Analyse Any Suspicious Links Using ANY.RUN’s New Safe Browsing Tool: Try for Free
GitHub Enterprise Server Vulnerability
This would enable them to provision users or gain administrator-level access without prior authentication. The flaw impacts all versions of the GitHub Enterprise Server prior to version 3.15 and has been addressed in updates released for versions 3.11.16, 3.12.10, 3.13.5, and 3.14.2.
GitHub has acted promptly to patch this vulnerability following its disclosure via their Bug Bounty program. The company emphasizes that the flaw only affects instances using SAML SSO with encrypted assertions enabled—a feature not activated by default—thereby limiting the scope of affected users.
The potential impact of this vulnerability is severe, with a maximum CVSS score of 10 out of 10, highlighting the critical nature of the threat. Exploitation could lead to unauthorized access to sensitive data and administrative functions within affected GitHub Enterprise Server instances.
As such, GitHub urges all users operating vulnerable configurations to update their systems immediately to mitigate potential security breaches.
GitHub Enterprise Server is a self-hosted platform designed for organizations needing greater control over their software development environments and sensitive data management. It supports large enterprises and development teams requiring offline access capabilities and enhanced security features.
In light of this vulnerability, organizations using GitHub Enterprise Server are advised to review their SAML SSO configurations and ensure that they are running the latest patched versions to protect against unauthorized access and potential data breaches.
Strategies to Protect Websites & APIs from Malware Attack => Free Webinar
The post GitHub Enterprise Server Vulnerability Allows Authentication Bypass appeared first on Cyber Security News.