An attacker with an Administrator role in GitHub Enterprise Server could gain SSH root access via remote code execution. This vulnerability affected GitHub Enterprise Server version 3.8.0 and above and was fixed in version 3.8.17, 3.9.12, 3.10.9, 3.11.7 and 3.12.1. This vulnerability was reported via the GitHub Bug Bounty program.
References
Configurations
No configuration.
History
21 Nov 2024, 09:09
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://docs.github.com/en/enterprise-server@3.10/admin/release-notes#3.10.9 - | |
References | () https://docs.github.com/en/enterprise-server@3.11/admin/release-notes#3.11.7 - | |
References | () https://docs.github.com/en/enterprise-server@3.12/admin/release-notes#3.12.1 - | |
References | () https://docs.github.com/en/enterprise-server@3.8/admin/release-notes#3.8.17 - | |
References | () https://docs.github.com/en/enterprise-server@3.9/admin/release-notes#3.9.12 - |
20 Mar 2024, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-03-20 23:15
Updated : 2024-11-21 09:09
NVD link : CVE-2024-2469
Mitre link : CVE-2024-2469
CVE.ORG link : CVE-2024-2469
JSON object : View
Products Affected
No product.
CWE
CWE-20
Improper Input Validation