GitHub Enterprise Server XML Signature Wrapping Vulnerability

CVE-2024-6800
9.8CRITICAL

Key Information

Vendor
Github
Status
Github Enterprise Server
Vendor
CVE Published:
20 August 2024

Badges

đź“° News Worthy

Summary

The CVE-2024-6800 vulnerability in GitHub Enterprise Server is a critical XML signature wrapping vulnerability that allows attackers to bypass authentication requirements when using SAML single sign-on (SSO) authentication with specific identity providers. This could result in unauthorized access to user accounts with site administrator privileges. The vulnerability affects all versions of GitHub Enterprise Server prior to 3.14 and has been fixed in versions 3.13.3, 3.12.8, 3.11.14, and 3.10.16. While it has not been exploited in the wild, organizations are advised to update to the patched versions to mitigate the risk. This vulnerability does not have any known impacts from ransomware groups.

Affected Version(s)

GitHub Enterprise Server <= 3.13.2

GitHub Enterprise Server <= 3.13.2

GitHub Enterprise Server <= 3.12.7

News Articles

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • First article discovered by Help Net Security

  • Vulnerability published.

Collectors

NVD DatabaseMitre Database1 News Article(s)

Credit

ahacker1
.