First published: Mon May 20 2024(Updated: )
An authentication bypass vulnerability was present in the GitHub Enterprise Server (GHES) when utilizing SAML single sign-on authentication with the optional encrypted assertions feature. This vulnerability allowed an attacker to forge a SAML response to provision and/or gain access to a user with site administrator privileges. Exploitation of this vulnerability would allow unauthorized access to the instance without requiring prior authentication. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.13.0 and was fixed in versions 3.9.15, 3.10.12, 3.11.10 and 3.12.4. This vulnerability was reported via the GitHub Bug Bounty program.
Credit: product-cna@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitHub Enterprise | <3.13.0>=3.9.15<3.9.15>=3.10.12<3.10.12>=3.11.10<3.11.10>=3.12.4<3.12.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-4985 is considered a high-severity vulnerability due to the potential for unauthorized access through authentication bypass.
To mitigate CVE-2024-4985, users should upgrade their GitHub Enterprise Server to the latest version beyond 3.13.0.
CVE-2024-4985 affects GitHub Enterprise Server versions 3.9.15, 3.10.12, 3.11.10, and all versions up to 3.13.0.
CVE-2024-4985 exploits an authentication bypass via forged SAML responses when using SAML single sign-on with encrypted assertions.
Yes, CVE-2024-4985 is specifically related to vulnerabilities in the SAML single sign-on authentication feature of GitHub Enterprise Server.