// For flags

CVE-2024-1908

Improper Privilege Management vulnerability was identified in GitHub Enterprise Server that allowed Privilege Escalation

Severity Score

6.3
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

An Improper Privilege Management vulnerability was identified in GitHub Enterprise Server that allowed an attacker to use the Enterprise Actions GitHub Connect download token to fetch private repository data. An attacker would require an account on the server instance with non-default settings for GitHub Connect. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.12 and was fixed in versions 3.8.16, 3.9.11, 3.10.8, and 3.11.6. This vulnerability was reported via the GitHub Bug Bounty program.

Se identificó una vulnerabilidad de administración de privilegios inadecuada en GitHub Enterprise Server que permitió a un atacante usar el token de descarga de Enterprise Actions GitHub Connect para recuperar datos del repositorio privado. Un atacante requeriría una cuenta en la instancia del servidor con una configuración no predeterminada para GitHub Connect. Esta vulnerabilidad afectó a todas las versiones de GitHub Enterprise Server anteriores a la 3.12 y se solucionó en las versiones 3.8.16, 3.9.11, 3.10.8 y 3.11.6. Esta vulnerabilidad se informó a través del programa GitHub Bug Bounty.

*Credits: ahacker1
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2024-02-26 CVE Reserved
  • 2024-02-29 CVE Published
  • 2024-03-01 EPSS Updated
  • 2024-08-05 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-269: Improper Privilege Management
CAPEC
  • CAPEC-233: Privilege Escalation
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
GitHub
Search vendor "GitHub"
Enterprise Server
Search vendor "GitHub" for product "Enterprise Server"
>= 3.8.0 < 3.8.16
Search vendor "GitHub" for product "Enterprise Server" and version " >= 3.8.0 < 3.8.16"
en
Affected
GitHub
Search vendor "GitHub"
Enterprise Server
Search vendor "GitHub" for product "Enterprise Server"
>= 3.9.0 < 3.9.11
Search vendor "GitHub" for product "Enterprise Server" and version " >= 3.9.0 < 3.9.11"
en
Affected
GitHub
Search vendor "GitHub"
Enterprise Server
Search vendor "GitHub" for product "Enterprise Server"
>= 3.10.0 < 3.10.8
Search vendor "GitHub" for product "Enterprise Server" and version " >= 3.10.0 < 3.10.8"
en
Affected
GitHub
Search vendor "GitHub"
Enterprise Server
Search vendor "GitHub" for product "Enterprise Server"
>= 3.11.0 < 3.11.6
Search vendor "GitHub" for product "Enterprise Server" and version " >= 3.11.0 < 3.11.6"
en
Affected