cvelist/2024/2xxx/CVE-2024-2469.json

178 lines
8.4 KiB
JSON
Raw Normal View History

2024-04-01 20:45:57 +00:00
{
2024-04-02 15:13:06 +00:00
"data_version": "4.0",
2024-04-01 20:45:57 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-2469",
2024-04-02 15:13:06 +00:00
"ASSIGNER": "product-cna@github.com",
"STATE": "PUBLIC"
2024-04-01 20:45:57 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-04-02 15:13:06 +00:00
"value": "An attacker with an Administrator role in GitHub Enterprise Server could gain SSH root access via remote code execution.\u00a0This vulnerability affected GitHub Enterprise Server version 3.8.0 and above and was fixed in version 3.8.17, 3.9.12, 3.10.9, 3.11.7 and 3.12.1. This vulnerability was reported via the GitHub Bug Bounty program."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-20 Improper Input Validation",
"cweId": "CWE-20"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "GitHub",
"product": {
"product_data": [
{
"product_name": "Enterprise Server",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"changes": [
{
"at": "3.8.17",
"status": "unaffected"
}
],
"lessThanOrEqual": "3.8.16",
"status": "affected",
"version": "3.8.0",
"versionType": "semver"
},
{
"changes": [
{
"at": "3.9.12",
"status": "unaffected"
}
],
"lessThanOrEqual": "3.9.11",
"status": "affected",
"version": "3.9.0",
"versionType": "semver"
},
{
"changes": [
{
"at": "3.10.9",
"status": "unaffected"
}
],
"lessThanOrEqual": "3.10.8",
"status": "affected",
"version": "3.10.0",
"versionType": "semver"
},
{
"changes": [
{
"at": "3.11.7",
"status": "unaffected"
}
],
"lessThanOrEqual": "3.11.6",
"status": "affected",
"version": "3.11.0",
"versionType": "semver"
},
{
"changes": [
{
"at": "3.12.1",
"status": "unaffected"
}
],
"lessThanOrEqual": "3.12.0",
"status": "affected",
"version": "3.12",
"versionType": "semver"
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://docs.github.com/en/enterprise-server@3.8/admin/release-notes#3.8.17",
"refsource": "MISC",
"name": "https://docs.github.com/en/enterprise-server@3.8/admin/release-notes#3.8.17"
},
{
"url": "https://docs.github.com/en/enterprise-server@3.9/admin/release-notes#3.9.12",
"refsource": "MISC",
"name": "https://docs.github.com/en/enterprise-server@3.9/admin/release-notes#3.9.12"
},
{
"url": "https://docs.github.com/en/enterprise-server@3.10/admin/release-notes#3.10.9",
"refsource": "MISC",
"name": "https://docs.github.com/en/enterprise-server@3.10/admin/release-notes#3.10.9"
},
{
"url": "https://docs.github.com/en/enterprise-server@3.11/admin/release-notes#3.11.7",
"refsource": "MISC",
"name": "https://docs.github.com/en/enterprise-server@3.11/admin/release-notes#3.11.7"
},
{
"url": "https://docs.github.com/en/enterprise-server@3.12/admin/release-notes#3.12.1",
"refsource": "MISC",
"name": "https://docs.github.com/en/enterprise-server@3.12/admin/release-notes#3.12.1"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "UNKNOWN"
},
"credits": [
{
"lang": "en",
"value": "inspector-ambitious"
}
],
"impact": {
"cvss": [
{
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
2024-04-01 20:45:57 +00:00
}
]
}
}