Lucene search

K
thnThe Hacker NewsTHN:B2AB10A9550D4CE01B8AADA39B549204
HistoryAug 22, 2024 - 4:48 a.m.

GitHub Patches Critical Security Flaw in Enterprise Server Granting Admin Privileges

2024-08-2204:48:00
The Hacker News
thehackernews.com
16
github
patches
critical
security
flaws
enterprise server
admin privileges
saml
single sign-on
authentication
cve identifier
cve-2024-6800
cvss score
9.5
microsoft-owned subsidiary
medium-severity
vulnerabilities
addressed
ghes versions
3.13.3
3.12.8
3.11.14
3.10.16
public repository
private repository
github app
update
safeguard

CVSS4

10

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/SC:H/VI:H/SI:H/VA:H/SA:H/U:Red/R:U/V:C/RE:M

AI Score

7.9

Confidence

Low

Enterprise Server

GitHub has released fixes to address a set of three security flaws impacting its Enterprise Server product, including one critical bug that could be abused to gain site administrator privileges.

The most severe of the shortcomings has been assigned the CVE identifier CVE-2024-6800, and carries a CVSS score of 9.5.

“On GitHub Enterprise Server instances that use SAML single sign-on (SSO) authentication with specific IdPs utilizing publicly exposed signed federation metadata XML, an attacker could forge a SAML response to provision and/or gain access to a user account with site administrator privileges,” GitHub said in an advisory.

Cybersecurity

The Microsoft-owned subsidiary has also addressed a pair of medium-severity flaws -

  • CVE-2024-7711 (CVSS score: 5.3) - An incorrect authorization vulnerability that could allow an attacker to update the title, assignees, and labels of any issue inside a public repository.
  • CVE-2024-6337 (CVSS score: 5.9) - An incorrect authorization vulnerability that could allow an attacker to access issue contents from a private repository using a GitHub App with only contents: read and pull requests: write permissions.

All three security vulnerabilities have been addressed in GHES versions 3.13.3, 3.12.8, 3.11.14, and 3.10.16.

Back in May, GitHub also patched a critical security vulnerability (CVE-2024-4985, CVSS score: 10.0) that could permit unauthorized access to an instance without requiring prior authentication.

Organizations that are running a vulnerable self-hosted version of GHES are highly advised to update to the latest version to safeguard against potential security threats.

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.

CVSS4

10

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/SC:H/VI:H/SI:H/VA:H/SA:H/U:Red/R:U/V:C/RE:M

AI Score

7.9

Confidence

Low

Related for THN:B2AB10A9550D4CE01B8AADA39B549204