First published: Fri Apr 19 2024(Updated: )
A race condition in GitHub Enterprise Server allowed an existing admin to maintain permissions on a detached repository by making a GraphQL mutation to alter repository permissions while the repository is detached. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.13 and was fixed in versions 3.9.13, 3.10.10, 3.11.8 and 3.12.1. This vulnerability was reported via the GitHub Bug Bounty program.
Credit: product-cna@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitHub Enterprise | <3.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-2440 is considered a high severity vulnerability due to the potential for administrative privilege escalation.
To mitigate CVE-2024-2440, upgrading to GitHub Enterprise Server version 3.14 or later is recommended.
CVE-2024-2440 allows an existing admin to maintain permissions on a detached repository, potentially compromising repository security.
CVE-2024-2440 affects all versions of GitHub Enterprise Server up to and including 3.13.
Yes, after applying the fix, you can continue using detached repositories with the enhanced security measures in place.