Thursday , June 5 2025
SAML

CVE-2025-23369
SAML Bypass Auth on GitHub Enterprise Servers to Login

A serious security vulnerability, CVE-2025-23369, has been found in GitHub Enterprise Server (GHES) that lets attackers bypass SAML authentication and impersonate user accounts.

This vulnerability takes advantage of specific anomalies in the libxml2 library employed in SAML response validation, allowing unauthorized access to accounts, even those with administrative rights.

CVSS 9.6: IBM QRadar & Cloud Pak Security Flaws Exposed

IBM has issued a security advisory for vulnerabilities in its QRadar Suite Software and Cloud Pak for Security platforms. These...
Read More
CVSS 9.6: IBM QRadar & Cloud Pak Security Flaws Exposed

ALERT
Thousands of IP addresses compromised nationwide: CIRT warn

As Bangladesh prepares for the extended Eid-ul-Adha holidays, the BGD e-GOV Computer Incident Response Team (CIRT) has issued an urgent...
Read More
ALERT  Thousands of IP addresses compromised nationwide: CIRT warn

New Android Malware ‘Crocodilus’ Targets Banks in 8 Countries

In March 2025, the Threatfabric mobile Threat Intelligence team identified Crocodilus, a new Android banking Trojan designed for device takeover....
Read More
New Android Malware ‘Crocodilus’ Targets Banks in 8 Countries

Qualcomm Patches 3 Zero-Days Used in Targeted Android Attacks

Qualcomm has issued security patches for three zero-day vulnerabilities in the Adreno GPU driver, affecting many chipsets that are being...
Read More
Qualcomm Patches 3 Zero-Days Used in Targeted Android Attacks

Critical RCE Flaw Patched in Roundcube Webmail

Roundcube Webmail has fixed a critical security flaw that could enable remote code execution after authentication. Disclosed by security researcher...
Read More
Critical RCE Flaw Patched in Roundcube Webmail

Hacker claim Leak of Deloitte Source Code & GitHub Credentials

A hacker known as "303" claim to breach the company's systems and leaked sensitive internal data on a dark web...
Read More
Hacker claim Leak of Deloitte Source Code & GitHub Credentials

CISA Issued Guidance for SIEM and SOAR Implementation

CISA and ACSC issued new guidance this week on how to procure, implement, and maintain SIEM and SOAR platforms. SIEM...
Read More
CISA Issued Guidance for SIEM and SOAR Implementation

Linux flaws enable password hash theft via core dumps in Ubuntu, RHEL, Fedora

The Qualys Threat Research Unit (TRU) found two local information-disclosure vulnerabilities in Apport and systemd-coredump. Both issues are race-condition vulnerabilities....
Read More
Linux flaws enable password hash theft via core dumps in Ubuntu, RHEL, Fedora

Australia enacts mandatory ransomware payment reporting

New ransomware payment reporting rules take effect in Australia yesterday (May 30) for all organisations with an annual turnover of...
Read More
Australia enacts mandatory ransomware payment reporting

Why Govt Demands Foreign CCTV Firms to Submit Source Code?

Global makers of surveillance gear have clashed with Indian regulators in recent weeks over contentious new security rules that require...
Read More
Why Govt Demands Foreign CCTV Firms to Submit Source Code?

The vulnerability arises from improper handling of XML entities within SAML responses.

Attackers can bypass signature verification by creating a malicious SAML response that manipulates XML entity references, allowing them to inject arbitrary assertions.

The issue impacts how GHES handles cryptographic signatures in SAML responses, resulting in a failure to validate the signed content’s integrity.

Security Assertion Markup Language (SAML) is a popular protocol for Single Sign-On (SSO) authentication. It uses an Identity Provider (IdP) to send signed authentication responses, which are verified by the Service Provider (SP). In this scenario, GitHub Enterprise Server is the SP, and the vulnerability arises from a flaw in how it validates SAML responses.

The problem lies in the has_root_sig_and_matching_ref? function within GHES’s SAML validation logic.

This function verifies if the root element of a SAML response is signed correctly. However, due to issues with libxml2, attackers can exploit XML entity references to make the system validate a different element as the root signature.

According to the report, this avoids important security measures and lets attackers insert harmful assertions.

For example, by using an XML entity like <!ENTITY idViaEntity “_129”> and referencing it in the root element’s ID attribute, attackers can cause inconsistencies between schema validation and XPath queries.

These inconsistencies allow unauthorized claims to be added while keeping the document structure intact.

All versions of GitHub Enterprise Server before 3.13.0 are vulnerable. This allows attackers to:

Gain unauthorized access to user accounts.
Escalate privileges to administrator levels.
Compromise sensitive repositories and data.

GitHub has released patches for this issue in versions 3.9.15, 3.10.12, 3.11.10, and 3.12.4. Administrators should update their systems right away to reduce risks.

Check Also

Qualcomm

Qualcomm Patches 3 Zero-Days Used in Targeted Android Attacks

Qualcomm has issued security patches for three zero-day vulnerabilities in the Adreno GPU driver, affecting …

Leave a Reply

Your email address will not be published. Required fields are marked *