Unauthorized Provisioning of Users and Access via SAML SSO Authentication Vulnerability
CVE-2024-9487

9.1CRITICAL

Key Information:

Vendor
Github
Vendor
CVE Published:
10 October 2024

Badges

πŸ“ˆ TrendedπŸ“ˆ Score: 4,660

What is CVE-2024-9487?

CVE-2024-9487 is a vulnerability in GitHub Enterprise Server, an enterprise-grade platform designed for software collaboration and version control. This particular vulnerability pertains to an improper verification of cryptographic signatures, which allows for the bypassing of SAML SSO (Single Sign-On) authentication. If exploited, it can enable unauthorized users to gain access to the GitHub instance without proper credentials, posing significant risks to the security of software projects and sensitive data managed within the platform.

Technical Details

The weakness found in GitHub Enterprise Server permits attackers to bypass the authentication mechanisms that rely on SAML SSO, contingent upon the use of the encrypted assertions feature being enabled. Attackers would need direct network access to the server and must have a signed SAML response or metadata document in order to take advantage of this vulnerability. This issue affects all versions of GitHub Enterprise Server prior to 3.15, and several updated versions have been issued to rectify the flaw, namely 3.11.16, 3.12.10, 3.13.5, and 3.14.2.

Impact of the Vulnerability

  1. Unauthorized Access: The primary concern is that attackers could gain unauthorized access to the GitHub Enterprise Server, allowing them to create user accounts without permission, potentially leading to data exposure and unauthorized changes to repositories.

  2. Data Compromise: With the ability to bypass authentication, sensitive project data stored in the GitHub instance may be at risk, resulting in potential data breaches and loss of intellectual property.

  3. Increased Operational Risks: Organizations relying on GitHub for version control and collaboration could face significant operational risks due to the likelihood of unauthorized alterations to code, impacts on project timelines, and a decrease in overall security posture.

Affected Version(s)

Enterprise Server 3.11.0 <= 3.11.15

Enterprise Server 3.11.0 <= 3.11.15

Enterprise Server 3.12.0 <= 3.12.9

References

CVSS V3.1

Score:
9.1
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • πŸ“ˆ

    Vulnerability started trending

  • Vulnerability published

Credit

SecureSAML.com
.