"GitHub Patches Critical Vulnerability in Enterprise Server"

Code hosting platform GitHub has recently released patches for a critical severity vulnerability in the GitHub Enterprise Server that could lead to unauthorized access to affected instances.  The vulnerability is tracked as CVE-2024-9487 (CVSS score of 9.5), and was introduced in May 2024 as part of the remediations released for CVE-2024-4985, a critical authentication bypass defect allowing attackers to forge SAML responses and gain administrative access to the Enterprise Server.  According to GitHub, the newly resolved flaw is a variant of the initial vulnerability, which also leads to authentication bypass.   The vulnerability was resolved in GitHub Enterprise Server versions 3.11.16, 3.12.10, 3.13.5, and 3.14.2, which also addressed a medium-severity information disclosure bug that could be exploited through malicious SVG files.  GitHub says both vulnerabilities were reported via its bug bounty program and did not mention any of them being exploited in the wild.  GitHub noted that GitHub Enterprise Server version 3.14.2 also fixes a sensitive data exposure issue in HTML forms in the management console by removing the "Copy Storage Setting from Actions" functionality.

 

SecurityWeek reports: "GitHub Patches Critical Vulnerability in Enterprise Server"

Submitted by Adam Ekwall on