First published: Tue Jan 16 2024(Updated: )
An attacker with access to a Management Console user account with the editor role could escalate privileges through a command injection vulnerability in the Management Console. This vulnerability affected all versions of GitHub Enterprise Server and was fixed in versions 3.11.3, 3.10.5, 3.9.8, and 3.8.13 This vulnerability was reported via the GitHub Bug Bounty program.
Credit: product-cna@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitHub Enterprise Server | <3.8.13 | |
GitHub Enterprise Server | >=3.9.0<3.9.8 | |
GitHub Enterprise Server | >=3.10.0<3.10.5 | |
GitHub Enterprise Server | >=3.11.0<3.11.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-0507 has been classified as a high severity vulnerability due to its potential for privilege escalation.
To remediate CVE-2024-0507, upgrade your GitHub Enterprise Server to version 3.11.3 or later.
CVE-2024-0507 affects all versions of GitHub Enterprise Server prior to 3.11.3, as well as certain versions in the 3.10 and 3.9 ranges.
The impact of CVE-2024-0507 includes unauthorized privilege escalation through command injection, potentially allowing attackers to obtain elevated access.
An attacker with access to a Management Console user account with the editor role can exploit CVE-2024-0507.