CVE-2024-0507

Scores

EPSS

0.777medium77.7%
0%20%40%60%80%100%

Percentile: 77.7%

CVSS

8.8high3.x
0246810

CVSS Score: 8.8/10

All CVSS Scores

CVSS 3.x
8.8

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Description

An attacker with access to a Management Console user account with the editor role could escalate privileges through a command injection vulnerability in the Management Console. This vulnerability affected all versions of GitHub Enterprise Server and was fixed in versions 3.11.3, 3.10.5, 3.9.8, and 3.8.13 This vulnerability was reported via the GitHub Bug Bounty program.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

nvd

CWEs

CWE-20

Related Vulnerabilities

Exploits

Exploit ID: CVE-2024-0507

Source: github-poc

URL: https://github.com/convisolabs/CVE-2024-0507_CVE-2024-0200-github

Vulnerable Software (1)

Type: Configuration

Vendor: github

Product: enterprise_server

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*",      "versionEndExcluding": "3.8.13",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3...

Source: nvd