First published: Tue Jul 16 2024(Updated: )
A Denial of Service vulnerability was identified in GitHub Enterprise Server that allowed an attacker to cause unbounded resource exhaustion by sending a large payload to the Git server. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.14 and was fixed in version 3.13.1, 3.12.6, 3.11.12, 3.10.14, and 3.9.17. This vulnerability was reported via the GitHub Bug Bounty program.
Credit: product-cna@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitHub Enterprise Server | >=3.9.0<3.9.17 | |
GitHub Enterprise Server | >=3.10.0<3.10.14 | |
GitHub Enterprise Server | >=3.11.0<3.11.12 | |
GitHub Enterprise Server | >=3.12.0<3.12.6 | |
GitHub Enterprise Server | =3.13.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-5795 has been classified as a Denial of Service vulnerability.
To fix CVE-2024-5795, upgrade to GitHub Enterprise Server version 3.14 or later.
CVE-2024-5795 affects all versions of GitHub Enterprise Server prior to 3.14.
CVE-2024-5795 allows attackers to cause unbounded resource exhaustion by sending large payloads.
There are no known workarounds for CVE-2024-5795; upgrading is the recommended solution.