Skip to content

An authentication bypass vulnerability was present in the...

Critical severity Unreviewed Published May 21, 2024 to the GitHub Advisory Database • Updated May 28, 2024

Package

No package listedSuggest a package

Affected versions

Unknown

Patched versions

Unknown

Description

An authentication bypass vulnerability was present in the GitHub Enterprise Server (GHES) when utilizing SAML single sign-on authentication with the optional encrypted assertions feature. This vulnerability allowed an attacker to forge a SAML response to provision and/or gain access to a user with site administrator privileges. Exploitation of this vulnerability would allow unauthorized access to the instance without requiring prior authentication. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.13.0 and was fixed in versions 3.9.15, 3.10.12, 3.11.10 and 3.12.4. This vulnerability was reported via the GitHub Bug Bounty program.

References

Published by the National Vulnerability Database May 20, 2024
Published to the GitHub Advisory Database May 21, 2024
Last updated May 28, 2024

Severity

Critical

EPSS score

0.045%
(17th percentile)

Weaknesses

CVE ID

CVE-2024-4985

GHSA ID

GHSA-5pw9-f9r4-mv2r

Source code

No known source code

Dependabot alerts are not supported on this advisory because it does not have a package from a supported ecosystem with an affected and fixed version.

Learn more about GitHub language support

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.