cve/2024/CVE-2024-0507.md
2025-09-29 21:09:30 +02:00

25 lines
1.3 KiB
Markdown

### [CVE-2024-0507](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0507)
![](https://img.shields.io/static/v1?label=Product&message=Enterprise%20Server&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=3.10.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=3.11.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=3.8.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=3.9.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-20%20Improper%20Input%20Validation&color=brightgreen)
### Description
An attacker with access to a Management Console user account with the editor role could escalate privileges through a command injection vulnerability in the Management Console. This vulnerability affected all versions of GitHub Enterprise Server and was fixed in versions 3.11.3, 3.10.5, 3.9.8, and 3.8.13 This vulnerability was reported via the GitHub Bug Bounty program.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/20142995/nuclei-templates
- https://github.com/convisolabs/CVE-2024-0507_CVE-2024-0200-github
- https://github.com/cyb3r-w0lf/nuclei-template-collection
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/tylzars/awesome-vrre-writeups