Логотип exploitDog
bind:CVE-2024-1482
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-1482

Количество 3

Количество 3

nvd логотип

CVE-2024-1482

почти 2 года назад

An incorrect authorization vulnerability was identified in GitHub Enterprise Server that allowed an attacker to create new branches in public repositories and run arbitrary GitHub Actions workflows with permissions from the GITHUB_TOKEN. To exploit this vulnerability, an attacker would need access to the Enterprise Server. This vulnerability affected all versions of GitHub Enterprise Server after 3.8 and prior to 3.12, and was fixed in versions 3.9.10, 3.10.7, 3.11.5. This vulnerability was reported via the GitHub Bug Bounty program.

CVSS3: 7.1
EPSS: Низкий
github логотип

GHSA-hpcc-2f3j-h5c3

почти 2 года назад

An incorrect authorization vulnerability was identified in GitHub Enterprise Server that allowed an attacker to create new branches in public repositories and run arbitrary GitHub Actions workflows with permissions from the GITHUB_TOKEN. To exploit this vulnerability, an attacker would need access to the Enterprise Server. This vulnerability affected all versions of GitHub Enterprise Server after 3.8 and prior to 3.12, and was fixed in versions 3.9.10, 3.10.7, 3.11.5. This vulnerability was reported via the GitHub Bug Bounty program.

CVSS3: 7.1
EPSS: Низкий
fstec логотип

BDU:2024-04466

почти 2 года назад

Уязвимость корпоративной версии платформы GitHub Enterprise Server, связанная с неправильной авторизацией, позволяющая нарушителю создавать новые ветви в общедоступных репозиториях и запускать произвольные рабочие процессы GitHub Actions с разрешениями от GITHUB_TOKEN

CVSS3: 7.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-1482

An incorrect authorization vulnerability was identified in GitHub Enterprise Server that allowed an attacker to create new branches in public repositories and run arbitrary GitHub Actions workflows with permissions from the GITHUB_TOKEN. To exploit this vulnerability, an attacker would need access to the Enterprise Server. This vulnerability affected all versions of GitHub Enterprise Server after 3.8 and prior to 3.12, and was fixed in versions 3.9.10, 3.10.7, 3.11.5. This vulnerability was reported via the GitHub Bug Bounty program.

CVSS3: 7.1
0%
Низкий
почти 2 года назад
github логотип
GHSA-hpcc-2f3j-h5c3

An incorrect authorization vulnerability was identified in GitHub Enterprise Server that allowed an attacker to create new branches in public repositories and run arbitrary GitHub Actions workflows with permissions from the GITHUB_TOKEN. To exploit this vulnerability, an attacker would need access to the Enterprise Server. This vulnerability affected all versions of GitHub Enterprise Server after 3.8 and prior to 3.12, and was fixed in versions 3.9.10, 3.10.7, 3.11.5. This vulnerability was reported via the GitHub Bug Bounty program.

CVSS3: 7.1
0%
Низкий
почти 2 года назад
fstec логотип
BDU:2024-04466

Уязвимость корпоративной версии платформы GitHub Enterprise Server, связанная с неправильной авторизацией, позволяющая нарушителю создавать новые ветви в общедоступных репозиториях и запускать произвольные рабочие процессы GitHub Actions с разрешениями от GITHUB_TOKEN

CVSS3: 7.1
0%
Низкий
почти 2 года назад

Уязвимостей на страницу