Article Details
Scrape Timestamp (UTC): 2024-08-22 04:50:17.481
Source: https://thehackernews.com/2024/08/github-patches-critical-security-flaw.html
Original Article Text
Click to Toggle View
GitHub Patches Critical Security Flaw in Enterprise Server Granting Admin Privileges. GitHub has released fixes to address a set of three security flaws impacting its Enterprise Server product, including one critical bug that could be abused to gain site administrator privileges. The most severe of the shortcomings has been assigned the CVE identifier CVE-2024-6800, and carries a CVSS score of 9.5. "On GitHub Enterprise Server instances that use SAML single sign-on (SSO) authentication with specific IdPs utilizing publicly exposed signed federation metadata XML, an attacker could forge a SAML response to provision and/or gain access to a user account with site administrator privileges," GitHub said in an advisory. The Microsoft-owned subsidiary has also addressed a pair of medium-severity flaws - All three security vulnerabilities have been addressed in GHES versions 3.13.3, 3.12.8, 3.11.14, and 3.10.16. Back in May, GitHub also patched a critical security vulnerability (CVE-2024-4985, CVSS score: 10.0) that could permit unauthorized access to an instance without requiring prior authentication. Organizations that are running a vulnerable self-hosted version of GHES are highly advised to update to the latest version to safeguard against potential security threats.
Daily Brief Summary
GitHub addressed three security vulnerabilities in its Enterprise Server, one being critically severe with a CVSS score of 9.5.
The critical bug, identified as CVE-2024-6800, allowed attackers to gain administrator privileges via a SAML response forgery.
Affected GitHub Enterprise Server versions were utilizing SAML SSO with certain IdPs that had publicly exposed signed federation metadata XML.
Patches were released for GHES versions 3.13.3, 3.12.8, 3.11.14, and 3.10.16, covering this and two medium-severity issues.
Additionally, GitHub had previously rectified another critical security flaw in May, which had a CVSS score of 10.0.
Organizations using vulnerable versions of the self-hosted GHES are strongly encouraged to update to the latest version to mitigate security risks.