First published: Wed Mar 20 2024(Updated: )
An attacker with an Administrator role in GitHub Enterprise Server could gain SSH root access via remote code execution. This vulnerability affected GitHub Enterprise Server version 3.8.0 and above and was fixed in version 3.8.17, 3.9.12, 3.10.9, 3.11.7 and 3.12.1. This vulnerability was reported via the GitHub Bug Bounty program.
Credit: product-cna@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitHub Enterprise | >=3.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-2469 is a critical vulnerability that allows an attacker with an Administrator role to gain SSH root access via remote code execution.
To fix CVE-2024-2469, upgrade GitHub Enterprise Server to version 3.8.17, 3.9.12, 3.10.9, 3.11.7, or 3.12.1.
CVE-2024-2469 affects all versions of GitHub Enterprise Server from 3.8.0 and above.
Exploiting CVE-2024-2469 allows unauthorized SSH root access to the server.
An attacker must have Administrator role permissions to exploit CVE-2024-2469.