Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-52jx-g6m5-h735

Опубликовано: 06 мар. 2025
Источник: github
Github: Прошло ревью
CVSS4: 9.3

Описание

Fleet has SAML authentication vulnerability due to improper SAML response validation

Summary

A vulnerability in Fleet’s SAML authentication handling could allow an attacker to forge authentication assertions and gain unauthorized access to Fleet. In certain configurations, this could result in the creation of new user accounts, including administrative accounts. This issue affects Fleet deployments using single sign-on (SSO).

Impact

In vulnerable versions of Fleet, an attacker could craft a specially-formed SAML response to:

  • Forge authentication assertions, potentially impersonating legitimate users.
  • If Just-In-Time (JIT) provisioning is enabled, the attacker could provision a new administrative user account.
  • If MDM enrollment is enabled, certain endpoints could be used to create new accounts tied to forged assertions.

This could allow unauthorized access to Fleet, including administrative access, visibility into device data, and modification of configuration.

Patches

This issue is addressed in commit fc96cc4 and is available in Fleet version 4.64.2.

The following backport versions also address this issue:

  • 4.63.2
  • 4.62.4
  • 4.58.1
  • 4.53.2

Workarounds

If an immediate upgrade is not possible, Fleet users should temporarily disable single-sign-on (SSO) and use password authentication.

Credit

Thank you @hakivvi, as well as Jeffrey Hofmann and Colby Morgan from the Robinhood Red Team for finding and reporting this vulnerability using our responsible disclosure process.

For more information

If you have any questions or comments about this advisory:

Пакеты

Наименование

github.com/fleetdm/fleet/v4

go
Затронутые версииВерсия исправления

>= 4.64.0, < 4.64.2

4.64.2

Наименование

github.com/fleetdm/fleet/v4

go
Затронутые версииВерсия исправления

>= 4.63.0, < 4.63.2

4.63.2

Наименование

github.com/fleetdm/fleet/v4

go
Затронутые версииВерсия исправления

>= 4.62.0, < 4.62.4

4.62.4

Наименование

github.com/fleetdm/fleet/v4

go
Затронутые версииВерсия исправления

>= 4.54.0, < 4.58.1

4.58.1

Наименование

github.com/fleetdm/fleet/v4

go
Затронутые версииВерсия исправления

< 4.53.2

4.53.2

EPSS

Процентиль: 41%
0.00187
Низкий

9.3 Critical

CVSS4

Дефекты

CWE-285
CWE-74

Связанные уязвимости

nvd
11 месяцев назад

fleetdm/fleet is an open source device management, built on osquery. In vulnerable versions of Fleet, an attacker could craft a specially-formed SAML response to forge authentication assertions, provision a new administrative user account if Just-In-Time (JIT) provisioning is enabled, or create new accounts tied to forged assertions if f MDM enrollment is enabled. This vulnerability is fixed in 4.64.2, 4.63.2, 4.62.4, and 4.58.1.

EPSS

Процентиль: 41%
0.00187
Низкий

9.3 Critical

CVSS4

Дефекты

CWE-285
CWE-74