GitHub Fixes Critical Security Vulnerability in Enterprise Server Allowing Admin Privileges

Aug 22, 2024Ravie LakshmananEnterprise Software / Vulnerability

GitHub has rolled out patches to fix a group of three security vulnerabilities affecting its Enterprise Server solution, with one crucial flaw that could be exploited to secure admin

GitHub Patches Critical Security Flaw in Enterprise Server Granting Admin Privileges

Aug 22, 2024Ravie LakshmananEnterprise Software / Vulnerability

GitHub Patches Critical Security Flaw in Enterprise Server Granting Admin Privileges

GitHub has rolled out patches to fix a group of three security vulnerabilities affecting its Enterprise Server solution, with one crucial flaw that could be exploited to secure administrator privileges.

The most critical of the issues has been labeled as CVE-2024-6800, scoring 9.5 on the CVSS scale.

“In scenarios where GitHub Enterprise Server instances rely on SAML single sign-on (SSO) authentication with certain Identity Providers (IdPs) using publicly accessible signed federation metadata XML, an attacker may fabricate a SAML response to create and/or obtain access to a user account with admin rights,” GitHub stated in a notification.

Cybersecurity

The technology company, which is now under Microsoft’s umbrella, has also fixed two moderate-severity vulnerabilities –

  • CVE-2024-7711 (CVSS score: 5.3) – A loophole in authorization that could let an attacker modify the title, assignees, and labels of any issue in a public repository.
  • CVE-2024-6337 (CVSS score: 5.9) – An authorization flaw allowing an attacker with GitHub App permissions limited to reading contents and writing pull requests to access issue details from private repositories.

All three security issues have been resolved in GHES versions 3.13.3, 3.12.8, 3.11.14, and 3.10.16.

Earlier in May, GitHub also addressed a critical security bug (CVE-2024-4985, CVSS score: 10.0) that could allow unauthorized access to an instance without prior authentication.

Organizations using an exposed self-hosted version of GHES are strongly recommended to upgrade to the most recent release to defend against possible security risks.

Liked this post? Stay connected with us on Twitter and LinkedIn for more exclusive updates.

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.