Critical SAML Exploit in GitHub Enterprise Server Fixed with Urgent Update
See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses
Specifics of the Flaw
The vulnerability affected instances utilizing SAML SSO with encrypted assertions, an optional security feature designed to protect data against interception. As this is not a default setting, only instances with this feature enabled were at risk.
“On instances that use SAML single sign-on (SSO) authentication with the optional encrypted assertions feature, an attacker could forge a SAML response to provision and/or gain access to a user with administrator privileges,” GitHub explained.
Patches and Fixes
GitHub has released fixes in versions 3.12.4, 3.11.10, 3.10.12, and 3.9.15 of GitHub Enterprise Server, all made available on May 20. Administrators are urged to update to these versions immediately to secure their instances.
Trending: 10 Misconceptions about Hacking
Trending: Digital Forensics Tool: dnstwist
Are u a security researcher? Or a company that writes articles about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing? If you want to express your idea in an article contact us here for a quote: [email protected]
Source: bleepingcomputer.com