Advisory

GitHub patches multple flaws in it's Enterprise Server, including a critical auth bypass flaw

Take action: If you are running GitHub Enterprise server with SAML SSO, time for a quick patch. Even if you aren't using SAML SSO if the server is accessible to the internet plan for the same quick patch. Finally, if your server is isolated in a trusted network, you have a bit more time. But don't ignore this flaw, eventually someone will find it and attack it.


Learn More

GitHub has released updates addressing multiple security vulnerabilities in GitHub Enterprise Server (GHES), including a critical authentication bypass flaw.

The most severe issue, tracked as CVE-2024-6800 (CVSS score 9.5), is an XML signature wrapping vulnerability that affects instances using SAML SSO authentication with certain identity providers. This flaw allows attackers with direct network access to forge a SAML response, enabling them to gain unauthorized administrator privileges on the affected GHES instance. Successful exploitation could lead to complete control of the server without requiring prior authentication.

GitHub has addressed the issue in GHES versions 3.13.3, 3.12.8, 3.11.14, and 3.10.16.

In addition to CVE-2024-6800, the update also addresses two medium-severity vulnerabilities:

  • CVE-2024-7711 (CVSS score 6.5): Allows attackers to modify issues in public repositories by changing titles, assignees, and labels.
  • CVE-2024-6337 (CVSS score 6.5): Enables disclosure of issue content from private repositories through GitHub Apps with specific permissions.

System administrators are advised to update GHES to the latest patched versions as soon as possible. GitHub’s advisory notes that some services may show errors during the update process, but the instance should start correctly. Admins should also review the “Known issues” section of the advisory for potential issues related to logs, memory usage, and service interruptions during specific operations.

GitHub patches multple flaws in it's Enterprise Server, including a critical auth bypass flaw