First published: Tue Feb 13 2024(Updated: )
A path traversal vulnerability was identified in GitHub Enterprise Server that allowed an attacker to gain unauthorized read permission to files by deploying arbitrary symbolic links to a GitHub Pages site with a specially crafted artifact tarball. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.12 and was fixed in versions 3.8.15, 3.9.10, 3.10.7, 3.11.5. This vulnerability was reported via the GitHub Bug Bounty program.
Credit: product-cna@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitHub Enterprise | <3.8.15 | |
GitHub Enterprise | >=3.9.0<3.9.10 | |
GitHub Enterprise | >=3.10.0<3.10.7 | |
GitHub Enterprise | >=3.11.0<3.11.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The CVE-2024-1082 vulnerability has been rated as a high severity vulnerability due to its potential for unauthorized file access.
To remediate CVE-2024-1082, update GitHub Enterprise Server to version 3.8.15 or later, or to any version from 3.9.10 or later.
CVE-2024-1082 affects GitHub Enterprise Server versions prior to 3.8.15, between 3.9.0 and 3.9.10, between 3.10.0 and 3.10.7, and between 3.11.0 and 3.11.5.
CVE-2024-1082 is classified as a path traversal vulnerability that can lead to unauthorized access to files.
Yes, CVE-2024-1082 can be exploited remotely by deploying malicious symbolic links on GitHub Pages.