--- licence_title: Creative Commons Attribution 4.0 International (CC-BY 4.0) licence_link: https://creativecommons.org/licenses/by/4.0/ licence_restrictions: https://cert.europa.eu/legal-notice licence_author: CERT-EU, The Cybersecurity Service for the European Union institutions, bodies, offices and agencies title: 'Critical Vulnerability in GitHub Enterprise Server' number: '2024-047' version: '1.0' original_date: 'May 21, 2024' date: 'May 22, 2024' --- _History:_ * _22/05/2024 --- v1.0 -- Initial publication_ # Summary On May 21, 2024, GitHub disclosed a critical vulnerability in GitHub Enterprise Server (GHES) impacting instances using SAML single sign-on (SSO) with encrypted assertions. This vulnerability allows attackers to forge SAML responses, granting unauthorised administrative access without authentication. [1] A proof of concept is publicly available. CERT-EU strongly recommends updating as soon as possible. [2] # Technical Details The vulnerability `CVE-2024-4985`, with a CVSS score of 10, involves SAML SSO with the optional encrypted assertions feature. An attacker could forge a SAML claim that contains correct user information. When GHES processes a fake SAML claim, it will not be able to validate its signature correctly, allowing an attacker to gain access to the GHES instance. # Affected Products The following GitHub Enterprise Server versions are affected: - 3.12.0 to 3.12.3; - 3.11.0 to 3.11.9; - 3.10.0 to 3.10.11; - 3.9.0 to 3.9.14. Only instances using SAML single sign-on (SSO) authentication are affected. # Recommendations CERT-EU strongly recommends updating as soon as possible. # References [1] [2]