First published: Tue Jul 16 2024(Updated: )
An Incorrect Authorization vulnerability was identified in GitHub Enterprise Server that allowed read access to issue content via GitHub Projects. This was only exploitable in internal repositories and required the attacker to have access to the corresponding project board. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.14 and was fixed in versions 3.13.1, 3.12.6, 3.11.12, 3.10.14, and 3.9.17. This vulnerability was reported via the GitHub Bug Bounty program.
Credit: product-cna@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitHub Enterprise | >=3.9.0<3.9.17 | |
GitHub Enterprise | >=3.10.0<3.10.14 | |
GitHub Enterprise | >=3.11.0<3.11.12 | |
GitHub Enterprise | >=3.12.0<3.12.6 | |
GitHub Enterprise | =3.13.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-5817 is classified as an Incorrect Authorization vulnerability affecting GitHub Enterprise Server.
To remediate CVE-2024-5817, upgrade to GitHub Enterprise Server version 3.10.15 or later, 3.11.12 or later, 3.12.6 or later, or 3.13.0.
CVE-2024-5817 affects versions 3.9.0 to 3.9.17, 3.10.0 to 3.10.14, 3.11.0 to 3.11.12, and 3.12.0 to 3.12.6 of GitHub Enterprise Server.
CVE-2024-5817 allows attackers with project board access to read issue content within internal repositories.
No, CVE-2024-5817 is only exploitable in internal repositories.