An XML signature wrapping vulnerability was present in GitHub Enterprise Server (GHES) when using SAML authentication with specific identity providers utilizing publicly exposed signed federation metadata XML. This vulnerability allowed an attacker with direct network access to GitHub Enterprise Server to forge a SAML response to provision and/or gain access to a user with site administrator privileges. Exploitation of this vulnerability would allow unauthorized access to the instance without requiring prior authentication. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.14 and was fixed in versions 3.13.3, 3.12.8, 3.11.14, and 3.10.16. This vulnerability was reported via the GitHub Bug Bounty program.
References
Link | Resource |
---|---|
https://docs.github.com/en/enterprise-server@3.10/admin/release-notes#3.10.16 | Release Notes Vendor Advisory |
https://docs.github.com/en/enterprise-server@3.11/admin/release-notes#3.11.14 | Release Notes Vendor Advisory |
https://docs.github.com/en/enterprise-server@3.12/admin/release-notes#3.12.8 | Release Notes Vendor Advisory |
https://docs.github.com/en/enterprise-server@3.13/admin/release-notes#3.13.3 | Release Notes Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
30 Sep 2024, 19:14
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:* | |
First Time |
Github
Github enterprise Server |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
References | () https://docs.github.com/en/enterprise-server@3.10/admin/release-notes#3.10.16 - Release Notes, Vendor Advisory | |
References | () https://docs.github.com/en/enterprise-server@3.11/admin/release-notes#3.11.14 - Release Notes, Vendor Advisory | |
References | () https://docs.github.com/en/enterprise-server@3.12/admin/release-notes#3.12.8 - Release Notes, Vendor Advisory | |
References | () https://docs.github.com/en/enterprise-server@3.13/admin/release-notes#3.13.3 - Release Notes, Vendor Advisory |
22 Aug 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) An XML signature wrapping vulnerability was present in GitHub Enterprise Server (GHES) when using SAML authentication with specific identity providers utilizing publicly exposed signed federation metadata XML. This vulnerability allowed an attacker with direct network access to GitHub Enterprise Server to forge a SAML response to provision and/or gain access to a user with site administrator privileges. Exploitation of this vulnerability would allow unauthorized access to the instance without requiring prior authentication. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.14 and was fixed in versions 3.13.3, 3.12.8, 3.11.14, and 3.10.16. This vulnerability was reported via the GitHub Bug Bounty program. |
21 Aug 2024, 12:30
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-20 20:15
Updated : 2024-09-30 19:14
NVD link : CVE-2024-6800
Mitre link : CVE-2024-6800
CVE.ORG link : CVE-2024-6800
JSON object : View
Products Affected
github
- enterprise_server
CWE
CWE-347
Improper Verification of Cryptographic Signature