GitHub has released patches to address a set of three security flaws affecting its Enterprise Server product, including one critical bug that can be exploited to gain site administrator privileges.
The most serious of the flaws was assigned a CVE ID of CVE-2024-6800 and a CVSS score of 9.5.
“On GitHub Enterprise Server instances that use SAML Single Sign-On (SSO) authentication with specific identities that use publicly signed XML merge metadata, an attacker could forge a SAML response to provide and/or gain access to an administrative user account site,” GitHub said in the consulting room.
The Microsoft subsidiary also fixed a couple of medium-severity flaws –
- CVE-2024-7711 (CVSS Score: 5.3) – Improper authorization vulnerability could allow an attacker to update the name, successors, and labels of any issue in a public repository.
- CVE-2024-6337 (CVSS Score: 5.9) – Improper authorization vulnerability could allow an attacker to access the content at issue from a private repository using a GitHub application with only content:read and pull:write permissions.
All three vulnerabilities were there addressed in GHES versions 3.13.3, 3.12.8, 3.11.14 and 3.10.16.
Back in May, so did GitHub patched up critical security vulnerability (CVE-2024-4985, CVSS score: 10.0) that could allow unauthorized access to an instance without prior authentication.
Organizations using a vulnerable version of GHES are strongly advised to update to the latest version to guard against potential security threats.