Command Injection Vulnerability in GitHub Enterprise Server Could Lead to Admin SSH Access
CVE-2024-1372
Summary
A command injection vulnerability has been identified in GitHub Enterprise Server, allowing threats to escalate access privileges. Attackers with an editor role in the Management Console can exploit this vulnerability during SAML configuration to gain unauthorized admin SSH access to the appliance. To exploit this weakness, an attacker must have access to the GitHub Enterprise Server instance with editor permissions. The flaw affects all versions of GitHub Enterprise Server prior to 3.12 and has been remediated in releases 3.11.5, 3.10.7, 3.9.10, and 3.8.15, underscoring the importance of timely updates to mitigate such risks.
Affected Version(s)
Enterprise Server 3.8.0
Enterprise Server 3.8.0 < 3.8.15
Enterprise Server 3.9.0 < 3.9.10
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved