
Cloud Vulnerability DB
A community-led vulnerabilities database
A command injection vulnerability (CVE-2024-1355) was identified in GitHub Enterprise Server that allowed an attacker with an editor role in the Management Console to gain admin SSH access to the appliance via the actions-console docker container while setting a service URL. The vulnerability was discovered and reported through the GitHub Bug Bounty program and affected all versions of GitHub Enterprise Server prior to 3.12. The issue was fixed in versions 3.11.5, 3.10.7, 3.9.10, and 3.8.15 (NVD).
The vulnerability is classified as a command injection vulnerability (CWE-77) with a CVSS v3.1 base score of 9.1 CRITICAL (Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H). The exploitation requires access to the GitHub Enterprise Server instance and access to the Management Console with the editor role (NVD).
If exploited, this vulnerability allows an attacker with editor role privileges to gain unauthorized admin SSH access to the appliance, potentially leading to complete system compromise (NVD).
The vulnerability has been patched in multiple GitHub Enterprise Server versions: 3.11.5, 3.10.7, 3.9.10, and 3.8.15. Users are advised to upgrade to these or later versions to mitigate the risk (GitHub Release Notes).
The vulnerability was responsibly disclosed through GitHub's Bug Bounty program, demonstrating the effectiveness of their security research community engagement (SecurityOnline).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."