CVE Vulnerabilities

CVE-2024-1908

Improper Privilege Management

Published: Mar 21, 2024 | Modified: Sep 02, 2025
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

An Improper Privilege Management vulnerability was identified in GitHub Enterprise Server that allowed an attacker to use the Enterprise Actions GitHub Connect download token to fetch private repository data. An attacker would require an account on the server instance with non-default settings for GitHub Connect. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.12 and was fixed in versions 3.8.16, 3.9.11, 3.10.8, and 3.11.6. This vulnerability was reported via the GitHub Bug Bounty program. 

Weakness

The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.

Affected Software

Name Vendor Start Version End Version
Enterprise_server Github * 3.8.16 (excluding)
Enterprise_server Github 3.9.0 (including) 3.9.11 (excluding)
Enterprise_server Github 3.10.0 (including) 3.10.8 (excluding)
Enterprise_server Github 3.11.0 (including) 3.11.6 (excluding)

Potential Mitigations

References