Article Details
Scrape Timestamp (UTC): 2024-05-21 15:03:07.428
Original Article Text
Click to Toggle View
GitHub warns of SAML auth bypass flaw in Enterprise Server. GitHub has fixed a maximum severity (CVSS v4 score: 10.0) authentication bypass vulnerability tracked as CVE-2024-4986, which impacts GitHub Enterprise Server (GHES) instances using SAML single sign-on (SSO) authentication. Exploiting the flaw would allow a threat actor to forge a SAML response and gain administrator privileges, providing unrestricted access to all of the instance's contents without requiring any authentication. GHES is a self-hosted version of GitHub designed for organizations that prefer to store repositories on their own servers or private cloud environments. It caters to the needs of large enterprises or development teams that require greater control over their assets, entities handling sensitive or proprietary data, organizations with high-performance needs, and users requiring offline access capabilities. The flaw, which was submitted to GitHub's Bug Bounty program, only impacts instances utilizing Security Assertion Markup Language (SAML) SSO with encrypted assertions. This optional feature protects data against interception (man-in-the-middle attacks). Due to encrypted assertions not being the default setting on GHES, CVE-2024-4986 only impacts instances whose administrators have enabled the security feature. The vulnerability has been fixed in GHEL versions 3.12.4, 3.11.10, 3.10.12, and 3.9.15, all released yesterday, on May 20. Known issues with the update include: Despite those issues, those using the vulnerable configuration (SAML SSO + encrypted assertions) should immediately move to a safe GHEL version.
Daily Brief Summary
GitHub has patched a critical vulnerability in its Enterprise Server, identified as CVE-2024-4986, with a CVSS v4 rating of 10.0.
The flaw affects instances that use Security Assertion Markup Language (SAML) single sign-on (SSO) with encrypted assertions.
Attackers could exploit the vulnerability to forge a SAML response, allowing unauthorized administrative access to the server's contents.
The vulnerability impacts only those GitHub Enterprise Server (GHES) instances where encrypted assertions have been enabled, not a default setting.
GHES is aimed at large enterprises or teams requiring enhanced control over data, including those managing sensitive information or needing offline access.
Affected versions have been updated: versions 3.12.4, 3.11.10, 3.10.12, and 3.9.15 were all released to address this issue as of May 20.
Instances using the vulnerable configuration should urgently upgrade to a secure version to mitigate risk.