A path traversal vulnerability was identified in GitHub Enterprise Server that allowed an attacker to gain unauthorized read permission to files by deploying arbitrary symbolic links to a GitHub Pages site with a specially crafted artifact tarball. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.12 and was fixed in versions 3.8.15, 3.9.10, 3.10.7, 3.11.5. This vulnerability was reported via the GitHub Bug Bounty program.
References
Link | Resource |
---|---|
https://docs.github.com/en/enterprise-server@3.10/admin/release-notes#3.10.7 | Release Notes Vendor Advisory |
https://docs.github.com/en/enterprise-server@3.11/admin/release-notes#3.11.5 | Release Notes Vendor Advisory |
https://docs.github.com/en/enterprise-server@3.8/admin/release-notes#3.8.15 | Release Notes Vendor Advisory |
https://docs.github.com/en/enterprise-server@3.9/admin/release-notes#3.9.10 | Release Notes Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
17 Oct 2024, 15:46
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
First Time |
Github
Github enterprise Server |
|
References | () https://docs.github.com/en/enterprise-server@3.10/admin/release-notes#3.10.7 - Release Notes, Vendor Advisory | |
References | () https://docs.github.com/en/enterprise-server@3.11/admin/release-notes#3.11.5 - Release Notes, Vendor Advisory | |
References | () https://docs.github.com/en/enterprise-server@3.8/admin/release-notes#3.8.15 - Release Notes, Vendor Advisory | |
References | () https://docs.github.com/en/enterprise-server@3.9/admin/release-notes#3.9.10 - Release Notes, Vendor Advisory | |
Summary |
|
13 Feb 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-13 19:15
Updated : 2024-10-17 15:46
NVD link : CVE-2024-1082
Mitre link : CVE-2024-1082
CVE.ORG link : CVE-2024-1082
JSON object : View
Products Affected
github
- enterprise_server
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')