GitHub has released security updates for Enterprise Server (GHES) to address multiple issues, including a critical bug that could allow unauthorized access to an instance.
The vulnerability, tracked as CVE-2024-9487, has a CVS score of 9.5 out of a maximum of 10.0
“An attacker could bypass SAML single sign-on (SSO) authentication with the optional encrypted claims feature, allowing unauthorized user provisioning and instance access by exploiting an improperly verified cryptographic signature vulnerability in GitHub Enterprise Server,” GitHub said in the notice.
The Microsoft-owned company described the flaw as a regression that was introduced as part of a subsequent patch from CVE-2024-4985 (CVSS Score: 10.0), a maximum severity vulnerability that was patched back in May 2024.
GitHub has also fixed two more flaws –
- CVE-2024-9539 (CVSS Score: 5.7) – Information disclosure vulnerability that could allow an attacker to obtain metadata belonging to a victim user after clicking malicious SVG asset URLs
- Exposing sensitive data in HTML forms in the management console (no CVE)
All three vulnerabilities were addressed in Enterprise Server versions 3.14.2, 3.13.5, 3.12.10, and 3.11.16.
Back in August, so did GitHub patched up critical security flaw (CVE-2024-6800, CVSS score: 9.5) that can be exploited to gain site administrator privileges.
Organizations using a vulnerable version of GHES are strongly advised to update to the latest version to guard against potential security threats.