Lucene search

K
vulnrichmentGitHub_PVULNRICHMENT:CVE-2024-6800
HistoryAug 20, 2024 - 7:21 p.m.

CVE-2024-6800

2024-08-2019:21:31
CWE-347
GitHub_P
github.com
6
xml signature
github enterprise server
saml authentication
network access
site administrator privileges
unauthorized access
github bug bounty

CVSS4

9.5

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/SC:H/VI:H/SI:H/VA:L/SA:L/U:Red/R:U/V:C/RE:H

AI Score

7.2

Confidence

Low

EPSS

0

Percentile

16.4%

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

An XML signature wrapping vulnerability was present in GitHub Enterprise Server (GHES) when utilizing SAML authentication with specific identity providers. This vulnerability allowed an attacker with direct network access to GitHub Enterprise Server to forge aΒ SAML response to provision and/or gain access to a user with site administrator privileges. Exploitation of this vulnerability would allow unauthorized access to the instance without requiring prior authentication.Β This vulnerability affected all versions of GitHub Enterprise Server prior to 3.14 and was fixed in versions 3.13.3, 3.12.8, 3.11.14, and 3.10.16. This vulnerability was reported via the GitHub Bug Bounty program.

CNA Affected

[
  {
    "vendor": "GitHub",
    "product": "GitHub Enterprise Server",
    "versions": [
      {
        "status": "affected",
        "changes": [
          {
            "at": "3.13.3",
            "status": "unaffected"
          }
        ],
        "version": "3.13.0",
        "versionType": "semver",
        "lessThanOrEqual": "3.13.2"
      },
      {
        "status": "affected",
        "changes": [
          {
            "at": "3.12.8",
            "status": "unaffected"
          }
        ],
        "version": "3.12.0",
        "versionType": "semver",
        "lessThanOrEqual": "3.12.7"
      },
      {
        "status": "affected",
        "changes": [
          {
            "at": "3.11.14",
            "status": "unaffected"
          }
        ],
        "version": "3.11.0",
        "versionType": "semver",
        "lessThanOrEqual": "3.11.13"
      },
      {
        "status": "affected",
        "changes": [
          {
            "at": "3.10.16",
            "status": "unaffected"
          }
        ],
        "version": "3.10.0",
        "versionType": "semver",
        "lessThanOrEqual": "3.10.15"
      }
    ],
    "defaultStatus": "affected"
  }
]

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:github:enterprise_server:-:*:*:*:*:*:*:*"
    ],
    "vendor": "github",
    "product": "enterprise_server",
    "versions": [
      {
        "status": "unaffected",
        "version": "3.13.3"
      },
      {
        "status": "affected",
        "version": "3.13.0",
        "versionType": "semver",
        "lessThanOrEqual": "3.13.2"
      },
      {
        "status": "unaffected",
        "version": "3.12.8"
      },
      {
        "status": "affected",
        "version": "3.12.0",
        "versionType": "semver",
        "lessThanOrEqual": "3.12.7"
      },
      {
        "status": "unaffected",
        "version": "3.11.14"
      },
      {
        "status": "affected",
        "version": "3.11.0",
        "versionType": "semver",
        "lessThanOrEqual": "3.11.13"
      },
      {
        "status": "unaffected",
        "version": "3.10.16"
      },
      {
        "status": "affected",
        "version": "3.10.0",
        "versionType": "semver",
        "lessThanOrEqual": "3.10.15"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS4

9.5

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/SC:H/VI:H/SI:H/VA:L/SA:L/U:Red/R:U/V:C/RE:H

AI Score

7.2

Confidence

Low

EPSS

0

Percentile

16.4%

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Related for VULNRICHMENT:CVE-2024-6800