Impact
A flaw in the repository_pages API of GitHub Enterprise Server allowed the server to blindly follow HTTP redirects when retrieving artifact URLs, while preserving the Authorization header that contained a privileged JSON Web Token. The exposed token (Actions.ManageOrgs JWT) could be exfiltrated by redirecting the request to an attacker‑controlled domain, giving the attacker the means to execute arbitrary code on the target instance. The underlying weakness is a redirect handling issue (CWE‑601).
Affected Systems
GitHub Enterprise Server for all releases prior to 3.19 is affected. The issue was resolved in releases 3.14.22, 3.15.17, 3.16.13, 3.17.10, 3.18.4, and 3.19.2; any older versions remain vulnerable.
Risk and Exploitability
The vulnerability carries a CVSS score of 7.6 and an EPSS score of less than 1%, indicating very low current exploitation probability. It is not listed in the CISA KEV catalog. Attackers would need functional access to the target GitHub Enterprise Server instance and the ability to trigger the vulnerable redirect against a user‑authenticating context. The risk is moderate overall, but the potential for remote code execution warrants swift remediation.
OpenCVE Enrichment