Lucene search

K
vulnrichmentGitHub_PVULNRICHMENT:CVE-2024-5816
HistoryJul 16, 2024 - 9:27 p.m.

CVE-2024-5816 Improper authorization allows persistent access in GitHub Enterprise Server

2024-07-1621:27:00
CWE-863
GitHub_P
github.com
3
cve-2024-5816
github
incorrect authorization vulnerability
suspended github app
scoped user access token
public repositories
private repositories
security vulnerability
github bug bounty program

CVSS4

6.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

ACTIVE

CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/SC:N/VI:H/SI:H/VA:N/SA:N

AI Score

6.7

Confidence

High

EPSS

0.001

Percentile

25.6%

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

An Incorrect Authorization vulnerability was identified in GitHub Enterprise Server that allowed a suspended GitHub App to retain access to the repository via a scoped user access token. This was only exploitable in public repositories while private repositories were not impacted. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.14 and was fixed in versions 3.9.17, 3.10.14, 3.11.12, 3.12.6, 3.13.1. This vulnerability was reported via the GitHub Bug Bounty program.

CNA Affected

[
  {
    "vendor": "GitHub",
    "product": "GitHub Enterprise Server",
    "versions": [
      {
        "status": "affected",
        "changes": [
          {
            "at": "3.10.14",
            "status": "unaffected"
          }
        ],
        "version": "3.10.0",
        "versionType": "semver",
        "lessThanOrEqual": "3.10.13"
      },
      {
        "status": "affected",
        "changes": [
          {
            "at": "3.11.12",
            "status": "unaffected"
          }
        ],
        "version": "3.11.0",
        "versionType": "semver",
        "lessThanOrEqual": "3.11.11"
      },
      {
        "status": "affected",
        "changes": [
          {
            "at": "3.12.6",
            "status": "unaffected"
          }
        ],
        "version": "3.12.0",
        "versionType": "semver",
        "lessThanOrEqual": "3.12.5"
      },
      {
        "status": "affected",
        "changes": [
          {
            "at": "3.13.1",
            "status": "unaffected"
          }
        ],
        "version": "3.13",
        "versionType": "semver",
        "lessThanOrEqual": "3.13.0"
      },
      {
        "status": "affected",
        "changes": [
          {
            "at": "3.9.17",
            "status": "unaffected"
          }
        ],
        "version": "3.9.0",
        "versionType": "semver",
        "lessThanOrEqual": "3.9.16"
      }
    ],
    "defaultStatus": "affected"
  }
]

CVSS4

6.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

ACTIVE

CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/SC:N/VI:H/SI:H/VA:N/SA:N

AI Score

6.7

Confidence

High

EPSS

0.001

Percentile

25.6%

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-5816