
Cloud Vulnerability DB
A community-led vulnerabilities database
An exposure of sensitive information vulnerability (CVE-2024-6395) was discovered in GitHub Enterprise Server that would allow an attacker to enumerate the names of private repositories that utilize deploy keys. The vulnerability affected all versions of GitHub Enterprise Server prior to 3.14 and was fixed in versions 3.13.1, 3.12.6, 3.11.12, 3.10.14, and 3.9.17. This vulnerability was reported through the GitHub Bug Bounty program (NVD).
The vulnerability is classified as an information exposure issue (CWE-200) that allows unauthorized access to private repository names, but not their contents. The CVSS v3.1 base score is 5.3 (MEDIUM) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N, indicating the vulnerability is network accessible, requires low attack complexity, needs no privileges or user interaction, and only impacts confidentiality (NVD).
The vulnerability only allowed attackers to view the names of private repositories that use deploy keys, without providing access to any other repository content. This could potentially expose information about an organization's private projects and internal structure (NVD).
GitHub has addressed this vulnerability by releasing fixes in multiple versions: 3.13.1, 3.12.6, 3.11.12, 3.10.14, and 3.9.17. Organizations should upgrade their GitHub Enterprise Server installations to one of these patched versions to mitigate the vulnerability (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."