CVE-2024-9487

CRITICAL NUCLEI

Github Enterprise Server < 3.11.16 - Signature Verification Bypass

Title source: rule

Description

An improper verification of cryptographic signature vulnerability was identified in GitHub Enterprise Server that allowed SAML SSO authentication to be bypassed resulting in unauthorized provisioning of users and access to the instance. Exploitation required the encrypted assertions feature to be enabled, and the attacker would require direct network access as well as a signed SAML response or metadata document. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.15 and was fixed in versions 3.11.16, 3.12.10, 3.13.5, and 3.14.2. This vulnerability was reported via the GitHub Bug Bounty program.

Nuclei Templates (1)

GitHub Enterprise - SAML Authentication Bypass
CRITICALVERIFIEDby iamnoooob,rootxharsh,pdresearch
Shodan: title:"GitHub Enterprise"

Scores

CVSS v3 9.1
EPSS 0.6027
EPSS Percentile 98.3%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Details

CWE
CWE-347
Status published
Products (1)
github/enterprise_server < 3.11.16
Published Oct 10, 2024
Tracked Since Feb 18, 2026