First published: Thu Nov 07 2024(Updated: )
A GitHub App installed in organizations could upgrade some permissions from read to write access without approval from an organization administrator. An attacker would require an account with administrator access to install a malicious GitHub App. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.14 and was fixed in versions 3.14.1, 3.13.4, 3.12.9, 3.11.15, and 3.10.17. This vulnerability was reported via the GitHub Bug Bounty program.
Credit: product-cna@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitHub Enterprise | <3.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-8810 has been rated with a high severity level due to the potential for significant unauthorized access escalation.
To fix CVE-2024-8810, organizations should upgrade their GitHub Enterprise Server to version 3.14 or higher.
CVE-2024-8810 affects organizations using GitHub Enterprise Server versions prior to 3.14 that have installed GitHub Apps.
CVE-2024-8810 allows GitHub Apps to change permissions from read access to write access without administrator approval.
An attacker needs an account with administrator access to install a malicious GitHub App that exploits CVE-2024-8810.