CVE-2024-2469
EUVD-2024-2741820.03.2024, 23:15
An attacker with an Administrator role in GitHub Enterprise Server could gain SSH root access via remote code execution. This vulnerability affected GitHub Enterprise Server version 3.8.0 and above and was fixed in version 3.8.17, 3.9.12, 3.10.9, 3.11.7 and 3.12.1. This vulnerability was reported via the GitHub Bug Bounty program.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| github | enterprise_server | 𝑥 < 3.8.17 |
| github | enterprise_server | 3.9.0 ≤ 𝑥 < 3.9.12 |
| github | enterprise_server | 3.10.0 ≤ 𝑥 < 3.10.9 |
| github | enterprise_server | 3.11.0 ≤ 𝑥 < 3.11.7 |
| github | enterprise_server | 3.12.0 ≤ 𝑥 < 3.12.1 |
𝑥
= Vulnerable software versions
Early Detection
Affected products identified ahead of NVD analysis through intelligence sources.
| Vendor | Product | Version | Source |
|---|---|---|---|
| github | enterprise_server | 3.8.0 ≤ 𝑥 ≤ 3.8.16 | ADP |
| github | enterprise_server | 3.9.0 ≤ 𝑥 ≤ 3.9.11 | ADP |
| github | enterprise_server | 3.10.0 ≤ 𝑥 ≤ 3.10.8 | ADP |
| github | enterprise_server | 3.11.0 ≤ 𝑥 ≤ 3.11.6 | ADP |
| github | enterprise_server | 3.12 ≤ 𝑥 ≤ 3.12.0 | ADP |
Common Weakness Enumeration
References