An authorization bypass vulnerability was identified in GitHub Enterprise Server that allowed unauthorized internal users to access sensitive secret scanning alert data intended only for business owners. This issue could be exploited only by organization members with a personal access token (PAT) and required that secret scanning be enabled on user-owned repositories. This vulnerability affected GitHub Enterprise Server versions after 3.13.0 but prior to 3.14.0 and was fixed in version 3.13.2.
References
Link | Resource |
---|---|
https://docs.github.com/en/enterprise-server@3.13/admin/release-notes#3.13.2 | Release Notes |
Configurations
History
27 Aug 2025, 16:27
Type | Values Removed | Values Added |
---|---|---|
References | () https://docs.github.com/en/enterprise-server@3.13/admin/release-notes#3.13.2 - Release Notes | |
CPE | cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:* | |
First Time |
Github
Github enterprise Server |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
08 Nov 2024, 19:01
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
07 Nov 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-07 22:15
Updated : 2025-08-27 16:27
NVD link : CVE-2024-10824
Mitre link : CVE-2024-10824
CVE.ORG link : CVE-2024-10824
JSON object : View
Products Affected
github
- enterprise_server
CWE
CWE-862
Missing Authorization