GitHub Fixes Critical Security Vulnerability in Enterprise Server Allowing Admin Privileges
GitHub has rolled out patches to fix a group of three security vulnerabilities affecting its Enterprise Server solution, with one crucial flaw that could be exploited to secure administrator privileges.
The most critical of the issues has been labeled as CVE-2024-6800, scoring 9.5 on the CVSS scale.
“In scenarios where GitHub Enterprise Server instances rely on SAML single sign-on (SSO) authentication with certain Identity Providers (IdPs) using publicly accessible signed federation metadata XML, an attacker may fabricate a SAML response to create and/or obtain access to a user account with admin rights,” GitHub stated in a notification.

The technology company, which is now under Microsoft’s umbrella, has also fixed two moderate-severity vulnerabilities –
- CVE-2024-7711 (CVSS score: 5.3) – A loophole in authorization that could let an attacker modify the title, assignees, and labels of any issue in a public repository.
- CVE-2024-6337 (CVSS score: 5.9) – An authorization flaw allowing an attacker with GitHub App permissions limited to reading contents and writing pull requests to access issue details from private repositories.
All three security issues have been resolved in GHES versions 3.13.3, 3.12.8, 3.11.14, and 3.10.16.
Earlier in May, GitHub also addressed a critical security bug (CVE-2024-4985, CVSS score: 10.0) that could allow unauthorized access to an instance without prior authentication.
Organizations using an exposed self-hosted version of GHES are strongly recommended to upgrade to the most recent release to defend against possible security risks.
