A GitHub App installed in organizations could upgrade some permissions from read to write access without approval from an organization administrator. An attacker would require an account with administrator access to install a malicious GitHub App. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.14 and was fixed in versions 3.14.1, 3.13.4, 3.12.9, 3.11.15, and 3.10.17. This vulnerability was reported via the GitHub Bug Bounty program.
CVSS
No CVSS.
References
Configurations
No configuration.
History
08 Nov 2024, 19:01
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
07 Nov 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-07 22:15
Updated : 2024-11-08 19:01
NVD link : CVE-2024-8810
Mitre link : CVE-2024-8810
CVE.ORG link : CVE-2024-8810
JSON object : View
Products Affected
No product.
CWE
CWE-269
Improper Privilege Management