A huge collection of 3400+ free website templates JAR theme com WP themes and more at the biggest community-driven free web design site

Alerts

Critical Authentication Bypass Vulnerability in The GitHub Enterprise Server (CVE-2024-4985)

Advisory No: TZCERT/SA/2024/05/23

Date of First Release: 23rd May 2024

Source: GitHub

Software Affected: GitHub Enterprise Server (GHES) prior to Version 3.13.0

Overview:

GitHub Enterprise Servers (GHES) prior to version 3.13.0 is affected by a critical authentication bypass vulnerability. The vulnerability allows an unauthorized access to the instance without requiring prior authentication.

Description:

An authentication bypass vulnerability, identified as CVE-2024-4985, was discovered in GitHub Enterprise Server (GHES) when using SAML single sign-on (SSO) authentication with the optional encrypted assertions feature. This vulnerability allows an attacker to forge a SAML response, which can then be used to provision and gain access to a user account with site administrator privileges. This critical flaw could enable attackers to bypass authentication mechanisms and gain unauthorized access to the GHES instance without needing prior authentication. A vulnerability has a CVSS Score of 10.0 and treated as critical.

Impact:

Successful exploitation of this vulnerability allows an attacker to gain unauthorizes access to the GHES instance, hence it may extend to exposure of sensitive data, operation disruption and/or further exploitation since an attacker could modify, delete or inject malicious code into repository.

Solution:

GitHub has released security patches for this vulnerability. Users and administrators are encouraged to apply necessary updates.

References:

  1. https://docs.github.com/en/enterprise-server@3.12/admin/release-notes#3.12.4-security-fixes
  2. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4985
  3. https://www.tenable.com/cve/CVE-2024-4985

TZCERT-SU-24-0531 (Cisco Security Update)

Cisco has released security updates to address a security vulnerability in Cisco OpenDNS service. Exploitation of this vulnerability may allow an attacker to cause denial of service condition to an affected system.

Users and Administrators are encouraged to review Cisco Security Advisory and apply necessary updates.

TZCERT-SU-24-0530 (Mageia Security Update)

Mageia has released security updates to address vulnerabilities in its multiple products. Exploitation of these vulnerabilities may allow an attacker to take control of an affected system.

Users and Administrators are encouraged to review Mageia Security Advisories dated 21st May 2024 and apply necessary updates.