Arctic Wolf Security Bulletin
Arctic Wolf Security Bulletin

CVE-2024-6800: Critical Authentication Bypass Vulnerability Affecting GitHub Enterprise Server

On August 20, 2024, GitHub released security fixes for a critical authentication bypass vulnerability in GitHub Enterprise Server, identified as CVE-2024-6800. Find Arctic Wolf’s recommendations.
Arctic Wolf Security Bulletin
6 min read

On August 20, 2024, GitHub released security fixes for a critical authentication bypass vulnerability in GitHub Enterprise Server, identified as CVE-2024-6800. GitHub Enterprise Server is a self-hosted version of GitHub, designed for organizations to manage and collaborate on code securely within their own infrastructure. This vulnerability affects instances using SAML single sign-on (SSO) with certain identity providers (IdPs) that publicly expose signed federation metadata XML. An attacker could exploit this flaw by forging a SAML response to provision or gain unauthorized access to a site administrator account. 

Arctic Wolf has not observed any exploitation of this vulnerability in the wild, and there are no known published Proof of Concept (PoC) exploits at this time. While vulnerabilities in GitHub Enterprise Server have not been publicly reported as being used in attacks, threat actors may focus on this vulnerability due to the significant access gained by compromising a vulnerable instance and the widespread use of GitHub across organizations globally. 

Recommendation for CVE-2024-6800

Upgrade to Latest Fixed Version

Arctic Wolf strongly recommends that customers upgrade to the latest fixed version. 

Product  Affected Version  Fixed Version 
GitHub Enterprise Server  Versions prior to 3.13.3, 3.12.8, 3.11.14, and 3.10.16  Any of the following: 

 

Note: GitHub has cautioned that errors may appear during configuration after the security updates are applied, but the instance should still start without issues. 

Please follow your organization’s patching and testing guidelines to avoid any operational impact. 

References 

 

Share this post: