CVE-2024-2748
CSRF vulnerability was identified in GitHub Enterprise Server that allowed performing actions on behalf of a user
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A Cross Site Request Forgery vulnerability was identified in GitHub Enterprise Server that allowed an attacker to execute unauthorized actions on behalf of an unsuspecting user. A mitigating factor is that user interaction is required. This vulnerability affected GitHub Enterprise Server 3.12.0 and was fixed in versions 3.12.1. This vulnerability was reported via the GitHub Bug Bounty program.
Se identificó una vulnerabilidad de Cross Site Request Forgery en GitHub Enterprise Server que permitió a un atacante ejecutar acciones no autorizadas en nombre de un usuario desprevenido. Un factor atenuante es que se requiere la interacción del usuario. Esta vulnerabilidad afectó a GitHub Enterprise Server 3.12.0 y se solucionó en las versiones 3.12.1. Esta vulnerabilidad se informó a través del programa GitHub Bug Bounty.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2024-03-20 CVE Reserved
- 2024-03-20 CVE Published
- 2024-03-21 EPSS Updated
- 2024-08-02 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-352: Cross-Site Request Forgery (CSRF)
CAPEC
- CAPEC-62: Cross Site Request Forgery
References (1)
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
GitHub Search vendor "GitHub " | Enterprise Server Search vendor "GitHub " for product "Enterprise Server" | 3.12.0 Search vendor "GitHub " for product "Enterprise Server" and version "3.12.0" | en |
Affected
|