A GitHub App installed in organizations could upgrade some permissions from read to write access without approval from an organization administrator. An attacker would require an account with administrator access to install a malicious GitHub App. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.14 and was fixed in versions 3.14.1, 3.13.4, 3.12.9, 3.11.15, and 3.10.17. This vulnerability was reported via the GitHub Bug Bounty program.
Metrics
Affected Vendors & Products
References
History
Fri, 08 Nov 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Github
Github enterprise Server |
|
CPEs | cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:* | |
Vendors & Products |
Github
Github enterprise Server |
|
Metrics |
ssvc
|
Thu, 07 Nov 2024 21:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A GitHub App installed in organizations could upgrade some permissions from read to write access without approval from an organization administrator. An attacker would require an account with administrator access to install a malicious GitHub App. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.14 and was fixed in versions 3.14.1, 3.13.4, 3.12.9, 3.11.15, and 3.10.17. This vulnerability was reported via the GitHub Bug Bounty program. | |
Title | Privilege Management vulnerability was identified in GitHub Enterprise Server that allowed GitHub Apps to grant themselves write access | |
Weaknesses | CWE-269 | |
References |
|
|
Metrics |
cvssV4_0
|
MITRE
Status: PUBLISHED
Assigner: GitHub_P
Published: 2024-11-07T21:24:34.754Z
Updated: 2024-11-08T15:47:50.811Z
Reserved: 2024-09-13T18:04:12.020Z
Link: CVE-2024-8810
Vulnrichment
Updated: 2024-11-08T15:47:03.568Z
NVD
Status : Awaiting Analysis
Published: 2024-11-07T22:15:21.520
Modified: 2024-11-08T19:01:03.880
Link: CVE-2024-8810
Redhat
No data.