Skip to main content

CVE-2024-1082: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in GitHub Enterprise Server

Medium
VulnerabilityCVE-2024-1082cvecve-2024-1082cwe-22
Published: Tue Feb 13 2024 (02/13/2024, 18:47:10 UTC)
Source: CVE
Vendor/Project: GitHub
Product: Enterprise Server

Description

A path traversal vulnerability was identified in GitHub Enterprise Server that allowed an attacker to gain unauthorized read permission to files by deploying arbitrary symbolic links to a GitHub Pages site with a specially crafted artifact tarball. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.12 and was fixed in versions 3.8.15, 3.9.10, 3.10.7, 3.11.5. This vulnerability was reported via the GitHub Bug Bounty program.

AI-Powered Analysis

AILast updated: 07/05/2025, 00:55:21 UTC

Technical Analysis

CVE-2024-1082 is a path traversal vulnerability (CWE-22) identified in GitHub Enterprise Server versions prior to 3.12, specifically affecting versions 3.8.0, 3.9.0, 3.10.0, and 3.11.0. This vulnerability allows an attacker with limited privileges—specifically, the ability to create and build GitHub Pages sites on the affected instance—to gain unauthorized read access to files outside the intended directory scope. The exploit involves deploying arbitrary symbolic links within a specially crafted artifact tarball used in GitHub Pages site builds. By manipulating these symbolic links, the attacker can traverse directories and access sensitive files that should be restricted, potentially exposing confidential information. The vulnerability does not allow modification or deletion of files (integrity and availability are not impacted), but the confidentiality impact is high due to unauthorized file read access. The CVSS 3.1 base score is 6.3 (medium severity), reflecting network attack vector, high attack complexity, low privileges required, no user interaction, and a scope change due to unauthorized file access. The vulnerability was responsibly disclosed via the GitHub Bug Bounty program and fixed in GitHub Enterprise Server versions 3.8.15, 3.9.10, 3.10.7, and 3.11.5. No known exploits in the wild have been reported to date.

Potential Impact

For European organizations using GitHub Enterprise Server internally, this vulnerability poses a significant confidentiality risk. Attackers with limited permissions to create GitHub Pages sites—often developers or internal users—could exploit this flaw to access sensitive files stored on the server, including configuration files, source code, credentials, or other proprietary data. This could lead to intellectual property theft, exposure of sensitive business information, or leakage of personal data protected under GDPR, resulting in regulatory penalties and reputational damage. Since GitHub Enterprise Server is commonly used by large enterprises, government agencies, and research institutions across Europe, the exposure could be widespread if unpatched. The requirement for some level of permission to create Pages sites limits the attack surface to insiders or compromised accounts, but insider threats or credential compromise scenarios remain realistic. The vulnerability does not impact system integrity or availability, so it is less likely to cause service disruption but remains a critical confidentiality concern.

Mitigation Recommendations

European organizations should immediately verify their GitHub Enterprise Server versions and upgrade to the fixed releases (3.8.15, 3.9.10, 3.10.7, or 3.11.5) as soon as possible. Until patched, organizations should restrict the ability to create and build GitHub Pages sites to a minimal set of trusted users, ideally disabling this feature if not required. Implement strict access controls and monitoring on GitHub Enterprise Server to detect unusual activity related to Pages site creation or artifact uploads. Conduct internal audits of permissions and review logs for suspicious symbolic link deployments or artifact builds. Additionally, consider network segmentation to limit exposure of the GitHub Enterprise Server to only trusted internal networks and enforce multi-factor authentication to reduce the risk of compromised accounts. Regularly update and patch GitHub Enterprise Server as part of a robust vulnerability management program to prevent exploitation of similar issues.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_P
Date Reserved
2024-01-30T19:17:02.516Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9817c4522896dcbd75e3

Added to database: 5/21/2025, 9:08:39 AM

Last enriched: 7/5/2025, 12:55:21 AM

Last updated: 7/26/2025, 8:16:47 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats