Critical GitHub Enterprise Server admin privilege vulnerability
Date of Publish:22nd Aug,2024
Severity : Critical
Affected versions
- GHES include 3.13.0 to 3.13.2, 3.10.0 to 3.10.15, 3.11.0 to 3.11.13 and 3.12.0 to 3.12.
Summary
A critical vulnerability is reported in GitHub Enterprise Server which could allow remote attacker to gain unauthorized access to a user account with administrator privileges and access code .
Description
A critical security flaw is found in GitHub GHES instances that use Security Assertion Markup Language (SAML) for single sign-on authentication. The SAML authentication allows specific identity providers (IdPs) that use publicly exposed and signed federation metadata XML. This could allow an remote attacker to establish a SAML response to gain administrator privileges on a compromised system, it allow an unauthorized access to your organization’s GitHub- repositories.
CVE-2024-7711 and CVE-2024-6337 are covered in the fixes release by vendor.
Recommendation/Solution
Fixed version : GitHub Enterprise Server (GHES) versions 3.13.3, 3.10.16, 3.11.14, and 3.12.8..
CVE Details:
NOTE: The information is provide is on “as is “ basis, without assurance of any kind .
Revision history
- 22-Aug-24 – advisory published. — Update to version 3.13.3, 3.10.16, 3.11.14, and 3.12.8
- 22-Aug-24- CVE addressed —All three CVE-2024-6800 ,CVE-2024-7711 and CVE-2024-6337
