Original Article Text

Click to Toggle View

GitHub Enterprise Server vulnerable to critical auth bypass flaw. A critical vulnerability affecting multiple versions of GitHub Enterprise Server could be exploited to bypass authentication and enable an attacker to gain administrator privileges on the machine. The security issue is identified as CVE-2024-6800 and received a 9.5 severity rating as per the CVSS 4.0 standard. It is described as an XML signature wrapping problem that occurs when using the Security Assertion Markup Language (SAML) authentication standard with certain identity providers. GitHub Enterprise Server (GHES) is a local version of GitHub for businesses that lack the experience for working with the public cloud or want to manage access and security controls. According to the FOFA search engine for network assets exposed on the public web, there are more than 36,500 GHES instances accessible over the internet, most of them (29,200) located in the United States. However, it is unclear how many of the exposed GHES machines are running a vulnerable version of the product. GitHub has addressed the issue in GHES versions 3.13.3, 3.12.8, 3.11.14, and 3.10.16. The new GHES releases also include fixes for two other vulnerabilities, both with a medium severity score: All three security issues were reported through GitHub's Bug Bounty program on the HackerOne platform. GitHub warns that some services might show errors during the configuration process after applying the security updates but instance should still start correctly. Several issues related to log entries, memory utilization, and service interruptions during specific operations are also noted in the bulletin, so system admins are advised to check the ‘Known issues’ section before they apply the update.

Daily Brief Summary

CYBERCRIME // Critical Authentication Flaw Found in GitHub Enterprise Server

A critical vulnerability (CVE-2024-6800) has been identified in GitHub Enterprise Server (GHES) that allows authentication bypass, granting administrator privileges.

Affected versions of GHES include multiple releases prior to the update addressing this issue.

The flaw, scoring a 9.5 severity rating, involves an XML signature wrapping issue with SAML authentication.

Over 36,500 GHES instances globally are accessible online, with the majority located in the U.S., exposing a significant number of systems to potential unauthorized access.

GitHub has released patches for the affected versions, specifically versions 3.13.3, 3.12.8, 3.11.14, and 3.10.16.

Alongside the critical flaw, the update also rectifies two medium severity vulnerabilities.

GitHub advises checking the 'Known issues' section post-update due to potential service errors and other operational issues noted in the updates.

All vulnerabilities were discovered and reported through GitHub's Bug Bounty program on HackerOne.