Lucene search

K
nvd[email protected]NVD:CVE-2024-0200
HistoryJan 16, 2024 - 7:15 p.m.

CVE-2024-0200

2024-01-1619:15:08
CWE-470
web.nvd.nist.gov
reflection injection
user-controlled methods
remote code execution
github enterprise server
organization owner
versions 3.8.13
3.9.8
3.10.5
3.11.3
github bug bounty

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8.9 High

AI Score

Confidence

High

0.046 Low

EPSS

Percentile

92.6%

An unsafe reflection vulnerability was identified in GitHub Enterprise Server that could lead to reflection injection. This vulnerability could lead to the execution of user-controlled methods and remote code execution. To exploit this bug, an actor would need to be logged into an account on the GHES instance with the organization owner role. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.12 and was fixed in versions 3.8.13, 3.9.8, 3.10.5, and 3.11.3. This vulnerability was reported via the GitHub Bug Bounty program.

Affected configurations

NVD
Node
githubenterprise_serverRange3.8.03.8.13
OR
githubenterprise_serverRange3.9.03.9.8
OR
githubenterprise_serverRange3.10.03.10.5
OR
githubenterprise_serverRange3.11.03.11.3

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8.9 High

AI Score

Confidence

High

0.046 Low

EPSS

Percentile

92.6%

Related for NVD:CVE-2024-0200