
Cloud Vulnerability DB
A community-led vulnerabilities database
An incorrect authorization vulnerability (CVE-2024-1482) was identified in GitHub Enterprise Server that allowed an attacker to create new branches in public repositories and run arbitrary GitHub Actions workflows with permissions from the GITHUB_TOKEN. The vulnerability was discovered and reported through the GitHub Bug Bounty program and affected all versions of GitHub Enterprise Server after 3.8 and prior to 3.12. The issue has been fixed in versions 3.9.10, 3.10.7, and 3.11.5 (NVD).
The vulnerability is classified as an incorrect authorization issue (CWE-863) with a CVSS v3.1 base score of 6.5 (MEDIUM) according to NVD, and 7.1 (HIGH) according to GitHub. The CVSS vector string is CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N, indicating network accessibility, low attack complexity, and high impact on integrity (NVD).
The vulnerability allows attackers with access to the Enterprise Server to create new branches in public repositories and execute arbitrary GitHub Actions workflows using the GITHUB_TOKEN permissions. This could potentially lead to unauthorized code execution and repository manipulation (NVD).
The vulnerability has been fixed in GitHub Enterprise Server versions 3.9.10, 3.10.7, and 3.11.5. Organizations running affected versions should upgrade to the patched versions to mitigate the risk (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."