Security

Patches

GitHub Enterprise Server patches 10-outta-10 critical hole

On the bright side, someone made up to $30,000+ for finding it


GitHub has patched its Enterprise Server software to fix a security flaw that scored a 10 out of 10 CVSS severity score.

The vulnerability affects instances of GitHub Enterprise Server, and gives full admin access to anyone exploiting the issue in any version of the code prior to version p3.13.0 of the code base.

"On instances that use SAML single sign-on (SSO) authentication with the optional encrypted assertions feature, an attacker could forge a SAML response to provision and/or gain access to a user with administrator privileges," GitHub disclosed this week in the release notes that accompanied patches for four versions of Enterprise Server.

The bug has been assigned as CVE-2024-4985 and received the maximum severity score of 10. However, not all instances of Enterprise Server are impacted since it requires the optional encrypted assertions feature to be enabled, and that in turn requires SAML SSO to be used as well.

Ironically, encrypted assertions are supposed to bolster security by encrypting communications sent from the SAML identity provider.

Plus, the bug doesn't exist at all in versions based on the latest 3.13.x branch, instead being observed in the 3.9.x, 3.10.x, 3.11.x, and 3.12.x branches. Many users still rely on older versions of software, so the impact of the vulnerability is still likely significant.

Microsoft-owned GitHub – the same Microsoft that has vowed to boost its at times woeful security – says it learned about the flaw through its bug bounty program, which rewards people who poke around GitHub software until they find a vulnerability. More severe bugs score bigger rewards, and in this case whoever reported the issue to GitHub got a windfall of $20-30,000 per GitHub's program.

Though, even $30,000 might be conservative. "The upper bound for critical vulnerabilities is only a guideline, and GitHub may reward higher amounts for exceptional reports," GitHub says. Since this was a maximum severity security hole, the person who found it might have been paid very generously indeed. ®

Send us news
3 Comments

You probably want to patch this critical GitHub Enterprise Server bug now

Unless you're cool with an unauthorized criminal enjoying admin privileges to comb through your code

Tired of airport security queues? SQL inject yourself into the cockpit, claim researchers

Infosec hounds say they spotted vulnerability during routine travel in the US

GitHub rolls back database change after breaking itself

Git blame an infrastructure update

AMD reverses course: Ryzen 3000 CPUs will get SinkClose patch after all

Still no love for 1000- or 2000-series

Multiple flaws in Microsoft macOS apps unpatched despite potential risks

Windows giant tells Cisco Talos it isn't fixing them

Who needs GitHub Copilot when you can roll your own AI code assistant at home

Here's how to get started with the open source tool Continue

AMD won’t patch Sinkclose security bug on older Zen CPUs

Kernel mode not good enough for you? Maybe you'll like SMM of this

Using 1Password on Mac? Patch up if you don’t want your Vaults raided

Hundreds of thousands of users potentially vulnerable

If you give Copilot the reins, don't be surprised when it spills your secrets

'All of the defaults are insecure' Zenity CTO claims

Devices with insecure SSH services are everywhere, say infosec duo

'Serendipitous' discovery may have you second guessing your appliances

FYI: Data from deleted GitHub repos may not actually be deleted

And the forking Microsoft-owned code warehouse doesn't see this as much of a problem

SAP Core AI bugs allowed access to internal network servers, say researchers

Wiz infoseccers able to promote themselves from humble customer to full-blown admin