CVE-2024-5746

A Server-Side Request Forgery vulnerability was identified in GitHub Enterprise Server that allowed an attacker with the Site Administrator role to gain arbitrary code execution capability on the GitHub Enterprise Server instance. Exploitation required authenticated access to GitHub Enterprise Server as a user with the Site Administrator role. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.13 and was fixed in versions 3.12.5, 3.11.11, 3.10.13, and 3.9.16. This vulnerability was reported via the GitHub Bug Bounty program.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*

History

27 Aug 2025, 20:54

Type Values Removed Values Added
References () https://docs.github.com/en/enterprise-server@3.10/admin/release-notes#3.10.13 - () https://docs.github.com/en/enterprise-server@3.10/admin/release-notes#3.10.13 - Release Notes
References () https://docs.github.com/en/enterprise-server@3.11/admin/release-notes#3.11.11 - () https://docs.github.com/en/enterprise-server@3.11/admin/release-notes#3.11.11 - Release Notes
References () https://docs.github.com/en/enterprise-server@3.12/admin/release-notes#3.12.5 - () https://docs.github.com/en/enterprise-server@3.12/admin/release-notes#3.12.5 - Release Notes
References () https://docs.github.com/en/enterprise-server@3.9/admin/release-notes#3.9.16 - () https://docs.github.com/en/enterprise-server@3.9/admin/release-notes#3.9.16 - Release Notes
CPE cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
First Time Github
Github enterprise Server

21 Nov 2024, 09:48

Type Values Removed Values Added
References () https://docs.github.com/en/enterprise-server@3.10/admin/release-notes#3.10.13 - () https://docs.github.com/en/enterprise-server@3.10/admin/release-notes#3.10.13 -
References () https://docs.github.com/en/enterprise-server@3.11/admin/release-notes#3.11.11 - () https://docs.github.com/en/enterprise-server@3.11/admin/release-notes#3.11.11 -
References () https://docs.github.com/en/enterprise-server@3.12/admin/release-notes#3.12.5 - () https://docs.github.com/en/enterprise-server@3.12/admin/release-notes#3.12.5 -
References () https://docs.github.com/en/enterprise-server@3.9/admin/release-notes#3.9.16 - () https://docs.github.com/en/enterprise-server@3.9/admin/release-notes#3.9.16 -
Summary
  • (es) Se identificó una vulnerabilidad de Server-Side Request Forgery en GitHub Enterprise Server que permitió a un atacante con la función de administrador del sitio obtener capacidad de ejecución de código arbitrario en la instancia de GitHub Enterprise Server. La explotación requería acceso autenticado a GitHub Enterprise Server como usuario con la función de Administrador del sitio. Esta vulnerabilidad afectó a todas las versiones de GitHub Enterprise Server anteriores a la 3.13 y se solucionó en las versiones 3.12.5, 3.11.11, 3.10.13 y 3.9.16. Esta vulnerabilidad se informó a través del programa GitHub Bug Bounty.

20 Jun 2024, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-20 22:15

Updated : 2025-08-27 20:54


NVD link : CVE-2024-5746

Mitre link : CVE-2024-5746

CVE.ORG link : CVE-2024-5746


JSON object : View

Products Affected

github

  • enterprise_server
CWE
CWE-918

Server-Side Request Forgery (SSRF)