Authentication Bypass Vulnerability in GitHub Enterprise Server via SAML Single Sign-On

CVE-2024-4985
Currently unrated 🤨

Key Information

Vendor
GitHub
Vendor
CVE Published:
20 May 2024

Badges

😄 Trended👾 Exploit Exists📰 News Worthy

Summary

The CVE-2024-4985 vulnerability affects GitHub Enterprise Server (GHES) and is a critical authentication bypass issue with a severity score of 10.0. This vulnerability allows attackers to gain unrestricted access to GHES instances using SAML single sign-on (SSO) authentication with the optional encrypted assertions feature enabled. Exploitation of the vulnerability can result in unauthorized access without requiring prior authentication. The impact of the vulnerability is substantial and can lead to theft of sensitive data, breaches of confidential information, and significant disruptions to development operations. The vulnerability has been fixed in versions 3.9.15, 3.10.12, 3.11.10, and 3.12.4 of GHES, and disabling SAML authentication or the encrypted assertions feature can serve as a temporary mitigation. At the time of the articles' publication, there were no confirmed reports of the vulnerability being actively exploited in the wild. Organizations using vulnerable GHES configurations are advised to apply the patches immediately to secure their systems.

News Articles

Timeline

  • First article discovered by Security Affairs

  • 👾

    Exploit exists.

  • Vulnerability started trending.

  • Vulnerability published.

Collectors

NVD Database4 News Article(s)
.