First published: Fri Apr 19 2024(Updated: )
A command injection vulnerability was identified in GitHub Enterprise Server that allowed an attacker with an editor role in the Management Console to gain admin SSH access to the instance when configuring the chat integration. Exploitation of this vulnerability required access to the GitHub Enterprise Server instance and access to the Management Console with the editor role. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.12 and was fixed in versions 3.12.2, 3.11.8, 3.10.10, and 3.9.13. This vulnerability was reported via the GitHub Bug Bounty program.
Credit: product-cna@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitHub Enterprise | <3.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-3646 is classified as a critical command injection vulnerability affecting GitHub Enterprise Server.
To remediate CVE-2024-3646, upgrade GitHub Enterprise Server to version 3.12 or later.
CVE-2024-3646 affects GitHub Enterprise Server instances where users have editor roles in the Management Console.
No, exploitation of CVE-2024-3646 requires that the attacker has access to an editor role in the Management Console.
CVE-2024-3646 involves a command injection attack that potentially allows gaining admin SSH access.