Summary
GitHub has remediated an authentication bypass vulnerability under CVE-2024-4985 (CVSSv4: 10.0). This vulnerability allows an attacker to use SAML single sign-on (SSO) authentication to sign in as a user with administrator privileges. This affects GitHub Enterprise Server (GHES) versions prior to 3.13.0 that use SAML SSO with encrypted assertions.
Impact Assessment
- CVSS Score: 10.0 (Critical)
- Affected Versions: GHES prior to 3.13.0
- Conditions: Only affects instances with SAML SSO and encrypted assertions enabled.
Urgency
This vulnerability requires immediate attention due to its severity and potential for exploitation.
Remediation
- Fixed Versions: 3.9.15, 3.10.12, 3.11.10, 3.12.4, and upcoming 3.13.0.
- Upgrade Guide: GitHub Docs
Business Implications
Exploitation could lead to unauthorized access, data exfiltration, and injection of malicious code, resulting in significant data, monetary, and reputational loss.
Recommendations
- Patch: Upgrade to the latest GHES version immediately.
- Mitigate: Disable encrypted assertions until the upgrade is completed.
Communication Plan
- Stakeholders: Inform security teams, IT operations, and executive management about the urgency and impact.
- Internal Notification: Use provided templates to communicate the required actions to all relevant teams.
Associated Bulletin
For more information or assistance, contact: