GitHub patches multple flaws in it's Enterprise Server, including a critical auth bypass flaw
Take action: If you are running GitHub Enterprise server with SAML SSO, time for a quick patch. Even if you aren't using SAML SSO if the server is accessible to the internet plan for the same quick patch. Finally, if your server is isolated in a trusted network, you have a bit more time. But don't ignore this flaw, eventually someone will find it and attack it.
Learn More
GitHub has released updates addressing multiple security vulnerabilities in GitHub Enterprise Server (GHES), including a critical authentication bypass flaw.
GitHub has addressed the issue in GHES versions 3.13.3, 3.12.8, 3.11.14, and 3.10.16.
In addition to CVE-2024-6800, the update also addresses two medium-severity vulnerabilities:
- CVE-2024-7711 (CVSS score 6.5): Allows attackers to modify issues in public repositories by changing titles, assignees, and labels.
- CVE-2024-6337 (CVSS score 6.5): Enables disclosure of issue content from private repositories through GitHub Apps with specific permissions.
System administrators are advised to update GHES to the latest patched versions as soon as possible. GitHub’s advisory notes that some services may show errors during the update process, but the instance should start correctly. Admins should also review the “Known issues” section of the advisory for potential issues related to logs, memory usage, and service interruptions during specific operations.