// For flags

CVE-2024-1084

 

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

Cross-site Scripting in the tag name pattern field in the tag protections UI in GitHub Enterprise Server allows a malicious website that requires user interaction and social engineering to make changes to a user account via CSP bypass with created CSRF tokens. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.12  and was fixed in all versions of 3.11.5, 3.10.7, 3.9.10, and 3.8.15. This vulnerability was reported via the GitHub Bug Bounty program.

Cross-Site Scripting en el campo de patrón de nombre de etiqueta en la interfaz de usuario de protección de etiquetas en GitHub Enterprise Server permiten que un sitio web malicioso que requiere interacción del usuario e ingeniería social realice cambios en una cuenta de usuario a través de la omisión de CSP con tokens CSRF creados. Esta vulnerabilidad afectó a todas las versiones de GitHub Enterprise Server anteriores a la 3.12 y se solucionó en todas las versiones 3.11.5, 3.10.7, 3.9.10 y 3.8.15. Esta vulnerabilidad se informó a través del programa GitHub Bug Bounty.

*Credits: Johan Carlsson (https://twitter.com/joaxcar), Roshan Kudave (https://twitter.com/ROSHANKUDAVE3), Sudhanshu Rajbhar (https://twitter.com/sudhanshur705)
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
Low
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2024-01-30 CVE Reserved
  • 2024-02-13 CVE Published
  • 2024-08-01 CVE Updated
  • 2024-10-18 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
  • CAPEC-63: Cross-Site Scripting (XSS)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
GitHub
Search vendor "GitHub"
Enterprise Server
Search vendor "GitHub" for product "Enterprise Server"
>= 3.8.0 <= 3.8.14
Search vendor "GitHub" for product "Enterprise Server" and version " >= 3.8.0 <= 3.8.14"
en
Affected
GitHub
Search vendor "GitHub"
Enterprise Server
Search vendor "GitHub" for product "Enterprise Server"
>= 3.9.0 <= 3.9.9
Search vendor "GitHub" for product "Enterprise Server" and version " >= 3.9.0 <= 3.9.9"
en
Affected
GitHub
Search vendor "GitHub"
Enterprise Server
Search vendor "GitHub" for product "Enterprise Server"
>= 3.10.0 <= 3.10.6
Search vendor "GitHub" for product "Enterprise Server" and version " >= 3.10.0 <= 3.10.6"
en
Affected
GitHub
Search vendor "GitHub"
Enterprise Server
Search vendor "GitHub" for product "Enterprise Server"
>= 3.11.0 <= 3.11.4
Search vendor "GitHub" for product "Enterprise Server" and version " >= 3.11.0 <= 3.11.4"
en
Affected