GitHub Enterprise Server vulnerable to critical auth bypass flaw

Teilen:

A critical vulnerability affecting multiple versions of GitHub Enterprise Server could be exploited to bypass authentication and enable an attacker to gain administrator privileges on the machine.

The security issue is identified as CVE-2024-6800 and received a 9.5 severity rating as per the CVSS 4.0 standard. It is described as an XML signature wrapping problem that occurs when using the Security Assertion Markup Language (SAML) authentication standard with certain identity providers.

“On GitHub Enterprise Server instances that use SAML single sign-on (SSO) authentication with specific IdPs utilizing publicly exposed signed federation metadata XML, an attacker could forge a SAML response to provision and/or gain access to a user account with site administrator privileges.” – GitHub

GitHub Enterprise Server (GHES) is a local version of GitHub for businesses that lack the experience for working with the public cloud or want to manage access and security controls.

According to the FOFA search engine for network assets exposed on the public web, there are more than 36,500 GHES instances accessible over the internet, most of them (29,200) located in the United States.

However, it is unclear how many of the exposed GHES machines are running a vulnerable version of the product.

GitHub has addressed the issue in GHES versions 3.13.3, 3.12.8, 3.11.14, and 3.10.16.

The new GHES releases also include fixes for two other vulnerabilities, both with a medium severity score:

  • CVE-2024-7711: allows issues on public repositories to be modified by attackers
  • CVE-2024-6337: relates to disclosing issue content from a private repository

All three security issues were reported through GitHub’s Bug Bounty program on the HackerOne platform.

GitHub warns that some services might show errors during the configuration process after applying the security updates but instance should still start correctly.

Several issues related to log entries, memory utilization, and service interruptions during specific operations are also noted in the bulletin, so system admins are advised to check the ‘Known issues’ section before they apply the update.

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
1:07 Uhr, Jan. 23, 2025
Wetter-Symbol 2°C
L: 1° | H: 3°
overcast clouds
Luftfeuchtigkeit: 91 %
Druck: 1004 mb
Wind: 5 mph WSW
Windböe: 0 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 85%
Regen Chance: 0%
Sichtbarkeit: 8 km
Sonnenaufgang: 7:51 am
Sonnenuntergang: 4:33 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 9:00 pm
Wetter-Symbol
1° | 3°°C 1 mm 100% 19 mph 90 % 1005 mb 0 mm/h
Tomorrow 9:00 pm
Wetter-Symbol
5° | 11°°C 1 mm 100% 24 mph 91 % 1003 mb 0 mm/h
Sa. Jan. 25 9:00 pm
Wetter-Symbol
2° | 5°°C 0.25 mm 25% 6 mph 93 % 1011 mb 0.26 mm/h
So. Jan. 26 9:00 pm
Wetter-Symbol
1° | 7°°C 1 mm 100% 15 mph 95 % 1010 mb 0 mm/h
Mo. Jan. 27 9:00 pm
Wetter-Symbol
6° | 9°°C 1 mm 100% 27 mph 89 % 993 mb 0 mm/h
Today 3:00 am
Wetter-Symbol
2° | 3°°C 0 mm 0% 5 mph 90 % 1004 mb 0 mm/h
Today 6:00 am
Wetter-Symbol
2° | 3°°C 0 mm 0% 7 mph 88 % 1005 mb 0 mm/h
Today 9:00 am
Wetter-Symbol
4° | 4°°C 0 mm 0% 8 mph 85 % 1004 mb 0 mm/h
Today 12:00 pm
Wetter-Symbol
8° | 8°°C 1 mm 100% 18 mph 83 % 1000 mb 0 mm/h
Today 3:00 pm
Wetter-Symbol
7° | 7°°C 1 mm 100% 19 mph 71 % 999 mb 0 mm/h
Today 6:00 pm
Wetter-Symbol
6° | 6°°C 0.8 mm 80% 15 mph 72 % 1003 mb 0 mm/h
Today 9:00 pm
Wetter-Symbol
5° | 5°°C 0 mm 0% 10 mph 77 % 1004 mb 0 mm/h
Tomorrow 12:00 am
Wetter-Symbol
6° | 6°°C 0 mm 0% 12 mph 79 % 1002 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€99,229.34
-2.62%
Ethereum(ETH)
€3,126.02
-2.69%
XRP(XRP)
€3.05
-0.79%
Fesseln(USDT)
€0.96
-0.04%
Solana(SOL)
€245.35
1.17%
Dogecoin(DOGE)
€0.346307
-2.85%
USDC(USDC)
€0.96
0.00%
Shiba Inu(SHIB)
€0.000019
-3.63%
Pepe(PEPE)
€0.000014
-5.79%
Peanut das Eichhörnchen(PNUT)
€0.349494
-3.98%
Nach oben scrollen