Github Enterprise Server: Attackers can bypass authentication

Under certain circumstances, unauthorized access to Github Enterprise Server is possible. Security updates are available.

listen Print view
Criminals attack server, admin tries to pull the plug

(Image: Bild erstellt mit KI in Bing Designer durch heise online / dmk)

2 min. read

Admins who host Github instances themselves with Github Enterprise Server should quickly update the underlying software. Otherwise, attackers could exploit a"critical" security vulnerability.

To secure servers, the secured versions 3.11.16, 3.12.10, 3.13.5 and 3.14.12 are available for download. Older versions are no longer supported and an upgrade is necessary at this point in order to continue to receive security updates in the future. According to the release notes, the critical vulnerability (CVE-2024-9487) has its origin in a fix for a similar vulnerability (CVE-2024-4985"critical") from May of this year.

Videos by heise

Only instances that rely on SAML SSO for authentication are affected. In addition, the Encrypted Assertions function must be active, which according to the developers is not the case by default. Attackers also need network access and a signed SAML response. If these requirements are met, attackers can bypass authentication due to insufficient certificate checks. This makes unauthorized access possible.

The developers have also closed a second vulnerability (CVE-2024-9539"medium"). If victims click on a prepared URL, information can be leaked.

Those responsible at Github state that both vulnerabilities were submitted via the Github bug bounty program. It is currently not known whether there are already attacks. It also remains unclear by which parameters admins can already recognize compromised servers.

(des)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.