May 22, 2024 at 03:35AM
GitHub patched a critical security flaw in its Enterprise Server software with the release of version p3.13.0, impacting instances using SAML SSO authentication. The bug, CVE-2024-4985, allows attackers to gain admin privileges when encrypted assertions are enabled. Microsoft-owned GitHub learned about the flaw through its bug bounty program, rewarding the discoverer generously.
From the meeting notes, the key takeaways are:
– GitHub has patched its Enterprise Server software to fix a security flaw with a severity score of 10 out of 10.
– The vulnerability affects instances of GitHub Enterprise Server and gives full admin access to anyone exploiting the issue in versions prior to p3.13.0 of the code base.
– The flaw, assigned as CVE-2024-4985, impacts instances that use SAML single sign-on (SSO) authentication with the optional encrypted assertions feature.
– The bug does not exist in versions based on the latest 3.13.x branch, but impacts versions 3.9.x, 3.10.x, 3.11.x, and 3.12.x. Since many users rely on older versions, the impact of the vulnerability is likely significant.
– The flaw was discovered through GitHub’s bug bounty program, and the individual who reported it received a substantial reward, potentially ranging from $20,000 to $30,000, with the possibility of higher amounts for exceptional reports.