First published: Tue Aug 20 2024(Updated: )
An Incorrect Authorization vulnerability was identified in GitHub Enterprise Server that allowed a GitHub App with only content: read and pull_request_write: write permissions to read issue content inside a private repository. This was only exploitable via user access token and installation access token was not impacted. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.14 and was fixed in versions 3.13.3, 3.12.8, 3.11.14 and 3.10.16. This vulnerability was reported via the GitHub Bug Bounty program.
Credit: product-cna@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitHub Enterprise | >=3.10.0<3.10.16 | |
GitHub Enterprise | >=3.11.0<3.11.14 | |
GitHub Enterprise | >=3.12.0<3.12.8 | |
GitHub Enterprise | >=3.13.0<3.13.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-6337 is rated as a medium severity vulnerability due to incorrect authorization in GitHub Enterprise Server.
To mitigate CVE-2024-6337, upgrade to GitHub Enterprise Server version 3.10.16, 3.11.14, 3.12.8, or 3.13.3 or later.
CVE-2024-6337 affects GitHub Enterprise Server versions between 3.10.0 to 3.10.16, 3.11.0 to 3.11.14, 3.12.0 to 3.12.8, and 3.13.0 to 3.13.3.
CVE-2024-6337 can be exploited by a GitHub App that has content: read and pull_request_write: write permissions using a user access token.
CVE-2024-6337 allows unauthorized reading of issue content inside a private repository.