Wednesday , February 12 2025
SAML

CVE-2025-23369
SAML Bypass Auth on GitHub Enterprise Servers to Login

A serious security vulnerability, CVE-2025-23369, has been found in GitHub Enterprise Server (GHES) that lets attackers bypass SAML authentication and impersonate user accounts.

This vulnerability takes advantage of specific anomalies in the libxml2 library employed in SAML response validation, allowing unauthorized access to accounts, even those with administrative rights.

Patch Now
SonicWall firewall vuln allows hackers to hijack VPN sessions

Bishop Fox security researchers have released detailed information on the CVE-2024-53704 vulnerability, which lets attackers bypass authentication in some versions...
Read More
Patch Now  SonicWall firewall vuln allows hackers to hijack VPN sessions

SAP Security Patch February 2025: Multi Vulns Addressed

SAP has issued new security patches for 19 vulnerabilities and updated 2 previous Security Notes. This Patch Day features fixes...
Read More
SAP Security Patch February 2025: Multi Vulns Addressed

TRACKING RANSOMWARE
Akira Topped January 2025 as the Most Active Ransomware Threat

In January 2025, there were 510 global ransomware incidents, with Akira as the leading group and new ones like MORPHEUS...
Read More
TRACKING RANSOMWARE  Akira Topped January 2025 as the Most Active Ransomware Threat

FinStealer Malware Targets Indian Bank’s Mobile Users, Stealing Credentials

CYFIRMA analysis reveals a sophisticated malware campaign that exploits a major Indian bank's brand through fake mobile apps. These apps,...
Read More
FinStealer Malware Targets Indian Bank’s Mobile Users, Stealing Credentials

CVE-2024-52875
Over 12,000 Firewall Vulnerable to 1-Click RCE Exploit

Over 1,200 firewall instances are vulnerable to a critical remote code execution issue, known as CVE-2024-52875. The vulnerability is found...
Read More
CVE-2024-52875  Over 12,000 Firewall Vulnerable to 1-Click RCE Exploit

CVE-2025-24200
Apple releases update of zero-day vuln exploited in the Wild

Apple has issued emergency security updates to fix a zero-day vulnerability, CVE-2025-24200, which is being exploited in targeted attacks on...
Read More
CVE-2025-24200  Apple releases update of zero-day vuln exploited in the Wild

Zimbra Releases Updates for SQL Injection, XSS, and SSRF Vulns

Zimbra has released updates for its Collaboration software to fix critical security flaws that could lead to information disclosure if...
Read More
Zimbra Releases Updates for SQL Injection, XSS, and SSRF Vulns

CVE-2025-23369
SAML Bypass Auth on GitHub Enterprise Servers to Login

A serious security vulnerability, CVE-2025-23369, has been found in GitHub Enterprise Server (GHES) that lets attackers bypass SAML authentication and...
Read More
CVE-2025-23369  SAML Bypass Auth on GitHub Enterprise Servers to Login

India to launch new domain name for banks to combat digital fraud

India's central bank to launch a special “.bank.in” domain for banks in April 2025 to fight digital payment fraud and...
Read More
India to launch new domain name for banks to combat digital fraud

Using 2.8 millions IPs, massive brute attack ongoing

The Shadowserver Foundation reports that a brute force attack has been active since last month, using nearly 2.8 million IP...
Read More
Using 2.8 millions IPs, massive brute attack ongoing

The vulnerability arises from improper handling of XML entities within SAML responses.

Attackers can bypass signature verification by creating a malicious SAML response that manipulates XML entity references, allowing them to inject arbitrary assertions.

The issue impacts how GHES handles cryptographic signatures in SAML responses, resulting in a failure to validate the signed content’s integrity.

Security Assertion Markup Language (SAML) is a popular protocol for Single Sign-On (SSO) authentication. It uses an Identity Provider (IdP) to send signed authentication responses, which are verified by the Service Provider (SP). In this scenario, GitHub Enterprise Server is the SP, and the vulnerability arises from a flaw in how it validates SAML responses.

The problem lies in the has_root_sig_and_matching_ref? function within GHES’s SAML validation logic.

This function verifies if the root element of a SAML response is signed correctly. However, due to issues with libxml2, attackers can exploit XML entity references to make the system validate a different element as the root signature.

According to the report, this avoids important security measures and lets attackers insert harmful assertions.

For example, by using an XML entity like <!ENTITY idViaEntity “_129”> and referencing it in the root element’s ID attribute, attackers can cause inconsistencies between schema validation and XPath queries.

These inconsistencies allow unauthorized claims to be added while keeping the document structure intact.

All versions of GitHub Enterprise Server before 3.13.0 are vulnerable. This allows attackers to:

Gain unauthorized access to user accounts.
Escalate privileges to administrator levels.
Compromise sensitive repositories and data.

GitHub has released patches for this issue in versions 3.9.15, 3.10.12, 3.11.10, and 3.12.4. Administrators should update their systems right away to reduce risks.

Check Also

zero-day

CVE-2025-24200
Apple releases update of zero-day vuln exploited in the Wild

Apple has issued emergency security updates to fix a zero-day vulnerability, CVE-2025-24200, which is being …

Leave a Reply

Your email address will not be published. Required fields are marked *