First published: Wed Mar 20 2024(Updated: )
A Cross Site Request Forgery vulnerability was identified in GitHub Enterprise Server that allowed an attacker to execute unauthorized actions on behalf of an unsuspecting user. A mitigating factor is that user interaction is required. This vulnerability affected GitHub Enterprise Server 3.12.0 and was fixed in versions 3.12.1. This vulnerability was reported via the GitHub Bug Bounty program.
Credit: product-cna@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitHub Enterprise |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-2748 is categorized as a Cross Site Request Forgery vulnerability in GitHub Enterprise Server.
To fix CVE-2024-2748, ensure that you apply the latest security update provided by GitHub for Enterprise Server.
An attacker can execute unauthorized actions on behalf of an unsuspecting user due to the Cross Site Request Forgery vulnerability.
Yes, user interaction is required for the exploitation of CVE-2024-2748.
CVE-2024-2748 affects GitHub Enterprise Server, but specific version details should be reviewed in the security advisory.