![](/assets/img/cve_300x82_sin_bg.png)
CVE-2024-3470 – Repository administrator can bypass organization's ruleset using deploy keys
https://notcve.org/view.php?id=CVE-2024-3470
19 Apr 2024 — An Improper Privilege Management vulnerability was identified in GitHub Enterprise Server that allowed an attacker to use a deploy key pertaining to an organization to bypass an organization ruleset. An attacker would require access to a valid deploy key for a repository in the organization as well as repository administrator access. This vulnerability affected versions of GitHub Enterprise Server 3.11 to 3.12 and was fixed in versions 3.11.8 and 3.12.2. This vulnerability was reported via the GitHub Bug Bo... • https://docs.github.com/en/enterprise-server@3.11/admin/release-notes#3.11.8 • CWE-269: Improper Privilege Management •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2024-2748 – CSRF vulnerability was identified in GitHub Enterprise Server that allowed performing actions on behalf of a user
https://notcve.org/view.php?id=CVE-2024-2748
20 Mar 2024 — A Cross Site Request Forgery vulnerability was identified in GitHub Enterprise Server that allowed an attacker to execute unauthorized actions on behalf of an unsuspecting user. A mitigating factor is that user interaction is required. This vulnerability affected GitHub Enterprise Server 3.12.0 and was fixed in versions 3.12.1. This vulnerability was reported via the GitHub Bug Bounty program. Se identificó una vulnerabilidad de Cross Site Request Forgery en GitHub Enterprise Server que permitió a un atacan... • https://docs.github.com/en/enterprise-server@3.12/admin/release-notes/#3.12.1 • CWE-352: Cross-Site Request Forgery (CSRF) •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2024-2469 – Remote Code Execution in GitHub Enterprise Server Allowed Administrators to gain SSH access to the appliance
https://notcve.org/view.php?id=CVE-2024-2469
20 Mar 2024 — An attacker with an Administrator role in GitHub Enterprise Server could gain SSH root access via remote code execution. This vulnerability affected GitHub Enterprise Server version 3.8.0 and above and was fixed in version 3.8.17, 3.9.12, 3.10.9, 3.11.7 and 3.12.1. This vulnerability was reported via the GitHub Bug Bounty program. Un atacante con función de administrador en GitHub Enterprise Server podría obtener acceso raíz SSH mediante la ejecución remota de código. Esta vulnerabilidad afectó a GitHub Ent... • https://docs.github.com/en/enterprise-server@3.10/admin/release-notes#3.10.9 • CWE-20: Improper Input Validation •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2024-1908 – Improper Privilege Management vulnerability was identified in GitHub Enterprise Server that allowed Privilege Escalation
https://notcve.org/view.php?id=CVE-2024-1908
29 Feb 2024 — An Improper Privilege Management vulnerability was identified in GitHub Enterprise Server that allowed an attacker to use the Enterprise Actions GitHub Connect download token to fetch private repository data. An attacker would require an account on the server instance with non-default settings for GitHub Connect. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.12 and was fixed in versions 3.8.16, 3.9.11, 3.10.8, and 3.11.6. This vulnerability was reported via the GitHub Bug B... • https://docs.github.com/en/enterprise-server@3.8/admin/release-notes/#3.8.16 • CWE-269: Improper Privilege Management •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2024-1482 – Improper Authorization in GitHub Enterprise Server allowed unauthorized workflow execution
https://notcve.org/view.php?id=CVE-2024-1482
14 Feb 2024 — An incorrect authorization vulnerability was identified in GitHub Enterprise Server that allowed an attacker to create new branches in public repositories and run arbitrary GitHub Actions workflows with permissions from the GITHUB_TOKEN. To exploit this vulnerability, an attacker would need access to the Enterprise Server. This vulnerability affected all versions of GitHub Enterprise Server after 3.8 and prior to 3.12, and was fixed in versions 3.9.10, 3.10.7, 3.11.5. This vulnerability was reported via the... • https://docs.github.com/en/enterprise-server@3.10/admin/release-notes#3.10.7 • CWE-863: Incorrect Authorization •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2024-1378 – Command injection vulnerability was identified in GitHub Enterprise Server that allowed privilege escalation in the Mangement Console
https://notcve.org/view.php?id=CVE-2024-1378
13 Feb 2024 — A command injection vulnerability was identified in GitHub Enterprise Server that allowed an attacker with an editor role in the Management Console to gain admin SSH access to the appliance via nomad templates when configuring SMTP options. Exploitation of this vulnerability required access to the GitHub Enterprise Server instance and access to the Management Console with the editor role. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.12 and was fixed in versions 3.11.5, 3.1... • https://docs.github.com/en/enterprise-server@3.10/admin/release-notes#3.10.7 • CWE-20: Improper Input Validation CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2024-1374 – Command injection vulnerability was identified in GitHub Enterprise Server that allowed privilege escalation in the Mangement Console
https://notcve.org/view.php?id=CVE-2024-1374
13 Feb 2024 — A command injection vulnerability was identified in GitHub Enterprise Server that allowed an attacker with an editor role in the Management Console to gain admin SSH access to the appliance via nomad templates when configuring audit log forwarding. Exploitation of this vulnerability required access to the GitHub Enterprise Server instance and access to the Management Console with the editor role. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.12 and was fixed in versions 3.1... • https://docs.github.com/en/enterprise-server@3.10/admin/release-notes#3.10.7 • CWE-20: Improper Input Validation CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2024-1372 – Command injection vulnerability was identified in GitHub Enterprise Server that allowed privilege escalation in the Mangement Console
https://notcve.org/view.php?id=CVE-2024-1372
13 Feb 2024 — A command injection vulnerability was identified in GitHub Enterprise Server that allowed an attacker with an editor role in the Management Console to gain admin SSH access to the appliance when configuring SAML settings. Exploitation of this vulnerability required access to the GitHub Enterprise Server instance and access to the Management Console with the editor role. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.12 and was fixed in versions 3.11.5, 3.10.7, 3.9.10, and 3.... • https://docs.github.com/en/enterprise-server@3.10/admin/release-notes#3.10.7 • CWE-20: Improper Input Validation CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2024-1369 – Command injection vulnerability was identified in GitHub Enterprise Server that allowed privilege escalation in the Mangement Console
https://notcve.org/view.php?id=CVE-2024-1369
13 Feb 2024 — A command injection vulnerability was identified in GitHub Enterprise Server that allowed an attacker with an editor role in the Management Console to gain admin SSH access to the appliance when setting the username and password for collectd configurations. Exploitation of this vulnerability required access to the GitHub Enterprise Server instance and access to the Management Console with the editor role. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.12 and was fixed in ver... • https://docs.github.com/en/enterprise-server@3.10/admin/release-notes#3.10.7 • CWE-20: Improper Input Validation CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2024-1359 – Command injection vulnerability was identified in GitHub Enterprise Server that allowed privilege escalation in the Mangement Console
https://notcve.org/view.php?id=CVE-2024-1359
13 Feb 2024 — A command injection vulnerability was identified in GitHub Enterprise Server that allowed an attacker with an editor role in the Management Console to gain admin SSH access to the appliance when setting up an HTTP proxy. Exploitation of this vulnerability required access to the GitHub Enterprise Server instance and access to the Management Console with the editor role. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.12 and was fixed in versions 3.11.5, 3.10.7, 3.9.10, and 3.8... • https://docs.github.com/en/enterprise-server@3.10/admin/release-notes#3.10.7 • CWE-20: Improper Input Validation CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •