First published: Tue Jan 16 2024(Updated: )
An unsafe reflection vulnerability was identified in GitHub Enterprise Server that could lead to reflection injection. This vulnerability could lead to the execution of user-controlled methods and remote code execution. To exploit this bug, an actor would need to be logged into an account on the GHES instance with the organization owner role. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.12 and was fixed in versions 3.8.13, 3.9.8, 3.10.5, and 3.11.3. This vulnerability was reported via the GitHub Bug Bounty program.
Credit: product-cna@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitHub Enterprise Server | >=3.8.0<3.8.13 | |
GitHub Enterprise Server | >=3.9.0<3.9.8 | |
GitHub Enterprise Server | >=3.10.0<3.10.5 | |
GitHub Enterprise Server | >=3.11.0<3.11.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-0200 has been rated as a high severity vulnerability due to its potential for remote code execution.
To fix CVE-2024-0200, upgrade GitHub Enterprise Server to a version above 3.8.13, 3.9.8, 3.10.5, or 3.11.3.
CVE-2024-0200 is caused by an unsafe reflection vulnerability that allows for reflection injection.
CVE-2024-0200 affects users of GitHub Enterprise Server versions from 3.8.0 to 3.8.13, 3.9.0 to 3.9.8, 3.10.0 to 3.10.5, and 3.11.0 to 3.11.3.
The potential impacts of CVE-2024-0200 include the execution of user-controlled methods and possible remote code execution.