8
CVE-2024-2469
- EPSS 0.82%
- Veröffentlicht 20.03.2024 23:15:07
- Zuletzt bearbeitet 04.09.2025 15:18:52
- Quelle product-cna@github.com
- CVE-Watchlists
- Unerledigt
Remote Code Execution in GitHub Enterprise Server Allowed Administrators to gain SSH access to the appliance
An attacker with an Administrator role in GitHub Enterprise Server could gain SSH root access via remote code execution. This vulnerability affected GitHub Enterprise Server version 3.8.0 and above and was fixed in version 3.8.17, 3.9.12, 3.10.9, 3.11.7 and 3.12.1. This vulnerability was reported via the GitHub Bug Bounty program.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Github ≫ Enterprise Server Version < 3.8.17
Github ≫ Enterprise Server Version >= 3.9.0 < 3.9.12
Github ≫ Enterprise Server Version >= 3.10.0 < 3.10.9
Github ≫ Enterprise Server Version >= 3.11.0 < 3.11.7
Github ≫ Enterprise Server Version >= 3.12.0 < 3.12.1
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.82% | 0.744 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7.2 | 1.2 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
|
| product-cna@github.com | 8 | 1.3 | 6 |
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.