- Description
- An improper verification of cryptographic signature vulnerability was identified in GitHub Enterprise Server that allowed SAML SSO authentication to be bypassed resulting in unauthorized provisioning of users and access to the instance. Exploitation required the encrypted assertions feature to be enabled, and the attacker would require direct network access as well as a signed SAML response or metadata document. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.15 and was fixed in versions 3.11.16, 3.12.10, 3.13.5, and 3.14.2. This vulnerability was reported via the GitHub Bug Bounty program.
- Source
- product-cna@github.com
- NVD status
- Analyzed
CVSS 4.0
- Type
- Secondary
- Base score
- 9.5
- Impact score
- -
- Exploitability score
- -
- Vector string
- CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:L/SC:H/SI:H/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:U/V:C/RE:M/U:Red
- Severity
- CRITICAL
CVSS 3.1
- Type
- Primary
- Base score
- 9.1
- Impact score
- 5.2
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
- Severity
- CRITICAL
- Hype score
- Not currently trending
🛡️ GitHub has released urgent security updates to fix a critical flaw (CVE-2024-9487) with a CVSS score of 9.5! This bug allows unauthorized access by bypassing SAML SSO authentication—an immediate threat to your enterprise. Details: https://t.co/CGVdP5DlDL https://t.co/ts2xPx
@johnwalshiii
17 Jan 2025
25 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
GitHub Patches Critical Flaw in Enterprise Server Allowing Unauthorized Instance Access Update GitHub Enterprise Server to patch critical SSO bypass vulnerability (CVE-2024-9487). Protect against unauthorized access. 🛡️ GitHub has released urgent security https://t.co/CGVdP5DlDL
@johnwalshiii
28 Dec 2024
21 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🛡️ GitHub has released urgent security updates to fix a critical flaw (CVE-2024-9487) with a CVSS score of 9.5! This bug allows unauthorized access by bypassing SAML SSO authentication—an immediate threat to your enterprise. Details: https://t.co/CGVdP5DlDL https://t.co/aqC9T2
@johnwalshiii
8 Dec 2024
31 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Github loophole dipatch (Login Bypass) Latest discovery reveals a critical GitHub Enterprise SAML Authentication Bypass (CVE-2024-9487)🔓
@byt3n33dl3
25 Nov 2024
38 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
GitHub Enterprise SAML Authentication Bypass (CVE-2024-4985 / CVE-2024-9487) https://t.co/8sONtwwtB8
@Dinosn
12 Nov 2024
2242 Impressions
6 Retweets
25 Likes
9 Bookmarks
0 Replies
0 Quotes
Check out our latest blog post! We dive into GitHub Enterprise’s SAML implementation and explore an authentication bypass in encrypted assertion mode. CVE-2024-4985 / CVE-2024-9487: GitHub Enterprise SAML Authentication Bypass. https://t.co/mFOE6GGkhO
@httpvoid0x2f
12 Nov 2024
9938 Impressions
46 Retweets
153 Likes
43 Bookmarks
0 Replies
1 Quote
Excited to share our latest discovery by our research team: a critical SAML Authentication Bypass in GitHub Enterprise (CVE-2024-9487) 🔓 ✅ Full technical breakdown ⚛️ Nuclei detection templates for rapid security checks Read the full write-up here: https://t.co/J19pNIfdFZ… htt
@emgeekboy
12 Nov 2024
3781 Impressions
22 Retweets
79 Likes
31 Bookmarks
0 Replies
0 Quotes
🚨 New Vulnerability Research Alert! 🚨 Our latest discovery reveals a critical GitHub Enterprise SAML Authentication Bypass (CVE-2024-9487) 🔓 ✅ Full technical analysis and impact breakdown ⚛️ Nuclei templates for rapid detection Read the full write-up:… https://t.co/tW3QNb7r
@pdiscoveryio
12 Nov 2024
4839 Impressions
16 Retweets
44 Likes
20 Bookmarks
0 Replies
1 Quote
GitHub addressed a critical vulnerability, CVE-2024-9487, in its Enterprise Server, which could allow unauthorized access by bypassing SAML SSO authentication. This flaw affected versions prior to 3.15 and has been patched in recent updates. The issue required encrypted… https://
@enfoasecurity
24 Oct 2024
258 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
GitHub has released critical security updates for Enterprise Server! The most severe flaw, CVE-2024-9487 (CVSS 9.5), allows attackers to bypass SAML SSO and gain unauthorized access. #Cybersecurity #GitHub #SecurityAlert #Infosec #Vulnerability #hacking #BugBounty https://t.co/
@safeyourweb
20 Oct 2024
1 Impression
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
GitHub fixes Critical Vulnerability CVE-2024-9487 #GitHub #CVE-2024-9487 https://t.co/y9dRBd32CH
@pravin_karthik
18 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🛡️ أصدر موقع GitHub تحديثات أمنية عاجلة لإصلاح خلل خطير (CVE-2024-9487) بدرجة CVSS 9.5! يسمح هذا الخلل بالوصول غير المصرح به عن طريق تجاوز مصادقة SAML SSO - وهو تهديد مباشر لمؤسستك. التفاصيل: https://t.co/JwzDy4g2YJ
@CERT_Arabic
6 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🛡️ #GitHub has released urgent security updates to fix a critical flaw (CVE-2024-9487) with a CVSS score of 9.5! This bug allows unauthorized access by bypassing SAML SSO authentication—an immediate threat to your enterprise. https://t.co/2ZfQx97vtB #infosecurity
@YourAnonRiots
190 Impressions
0 Retweets
2 Likes
1 Bookmark
0 Replies
0 Quotes
GitHub Patches Critical Flaw in Enterprise Server Allowing Unauthorized Instance Access. The vulnerability, tracked as CVE-2024-9487, carries a CVS score of 9.5 out of a maximum of 10.0 https://t.co/lXvXtkLrjv https://t.co/DqZr1oGV5K
@riskigy
15 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🛡️ GitHub has released urgent security updates to fix a critical flaw (CVE-2024-9487) with a CVSS score of 9.5! This bug allows unauthorized access by bypassing SAML SSO authentication—an immediate threat to your enterprise. Details: https://t.co/MpfKkZLofk #infosec
@MokraniMoustafa
39 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 ¡Alerta de Seguridad Crítica para GitHub Enterprise Server! 🚨 GitHub ha lanzado parches para GHES, abordando múltiples vulnerabilidades severas. Aquí lo más importante: 🔒 **CVE-2024-9487**: Vulnerabilidad crítica (CVSS 9.5) que puede permitir acceso no autorizado a la… htt
@antu_tech
5 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🛡️ GitHub has released urgent security updates to fix a critical flaw (CVE-2024-9487) with a CVSS score of 9.5! This bug allows unauthorized access by bypassing SAML SSO authentication—an immediate threat to your enterprise. Details: https://t.co/gn7I8wf5TM #infosec
@TheHackersNews
49295 Impressions
87 Retweets
166 Likes
38 Bookmarks
4 Replies
6 Quotes
GitHub anunció una actualización para Github Enterprise que corrige varias vulnerabilidades, incluida una crítica (CVE-2024-9487), que permite el acceso no autorizado al eludir la autenticación SAML, con una puntuación CVSS de 9.5. https://t.co/ccLqz08Lr2 vía @TheHackersNews htt
@ElliotSecOps
538 Impressions
3 Retweets
19 Likes
2 Bookmarks
1 Reply
1 Quote
GitHub has issued security updates for a critical vulnerability in its Enterprise Server (GHES) that is causing multiple issues. The vulnerability, tracked as CVE-2024-9487, has a CVSS rating of 9.5 out of 10. More details here: https://t.co/rpMgTFcAub #GitHub #Vulnerability
@CandidTodayTech
12 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
📌 قامت GitHub بإصدار تحديثات أمان لخادم المؤسسة (GHES) لمعالجة ثغرة حرجة قد تسمح بالوصول غير المصرح به. تُعرف الثغرة باسم CVE-2024-9487 وتحمل درجة خطر 9.5 من 10. يمكن للمهاجم تجاوز مصادقة SAML بفضل هذه الثغرة. #الامن_السيبراني https://t.co/HrtMEncf7A
@cyberetweet
25 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "E624875C-FCF2-4538-8F3E-D64183154275",
"versionEndExcluding": "3.11.16"
},
{
"criteria": "cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "F70645DE-4DC2-40CB-B425-4E002B302FDB",
"versionEndExcluding": "3.12.10",
"versionStartIncluding": "3.12.0"
},
{
"criteria": "cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "B08CBD2C-6DA7-4C0F-9812-42933F51C003",
"versionEndExcluding": "3.13.5",
"versionStartIncluding": "3.13.0"
},
{
"criteria": "cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "59E74193-93FE-45FE-8C74-34EC30EEB03C",
"versionEndExcluding": "3.14.2",
"versionStartIncluding": "3.14.0"
}
],
"operator": "OR"
}
]
}
]