CVE-2024-10001
GitHub Enterprise Server vulnerability analysis and mitigation

Overview

A Code Injection vulnerability (CVE-2024-10001) was identified in GitHub Enterprise Server that allowed attackers to inject malicious code into the query selector via the identity property in the message handling function. The vulnerability was discovered and reported through the GitHub Bug Bounty program and affects all versions of GitHub Enterprise Server prior to 3.11.16, 3.12.10, 3.13.5, 3.14.2, and 3.15.0 (GitHub Release Notes).

Technical details

The vulnerability enables attackers to inject malicious code through the identity parameter in querySelector handling. This allows for the exfiltration of sensitive data by manipulating the DOM, including authentication tokens. The attack requires the victim to be logged into GitHub and interact with an attacker-controlled malicious webpage containing a hidden iframe. The vulnerability occurs due to an improper sequence of validation, where the origin check occurs after accepting the user-controlled identity property. The severity is rated as HIGH according to GitHub's assessment (GitHub Release Notes).

Impact

The vulnerability allows attackers to exfiltrate sensitive data from the DOM, including authentication tokens, by manipulating the DOM through malicious code injection. This could potentially lead to unauthorized access to user data and authentication credentials (GitHub Release Notes).

Mitigation and workarounds

The vulnerability has been patched in GitHub Enterprise Server versions 3.11.16, 3.12.10, 3.13.5, 3.14.2, and 3.15.0. Organizations should upgrade their GitHub Enterprise Server installations to these versions or later to mitigate the vulnerability (GitHub Release Notes).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management