Skip to main content

CVE-2024-1359: CWE-20 Improper Input Validation in GitHub Enterprise Server

Critical
VulnerabilityCVE-2024-1359cvecve-2024-1359cwe-20
Published: Tue Feb 13 2024 (02/13/2024, 18:52:27 UTC)
Source: CVE
Vendor/Project: GitHub
Product: Enterprise Server

Description

A command injection vulnerability was identified in GitHub Enterprise Server that allowed an attacker with an editor role in the Management Console to gain admin SSH access to the appliance when setting up an HTTP proxy. Exploitation of this vulnerability required access to the GitHub Enterprise Server instance and access to the Management Console with the editor role. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.12 and was fixed in versions 3.11.5, 3.10.7, 3.9.10, and 3.8.15. This vulnerability was reported via the GitHub Bug Bounty program https://bounty.github.com .

AI-Powered Analysis

AILast updated: 07/05/2025, 00:55:46 UTC

Technical Analysis

CVE-2024-1359 is a critical command injection vulnerability affecting GitHub Enterprise Server versions prior to 3.12, specifically versions 3.8.0, 3.9.0, 3.10.0, and 3.11.0. The vulnerability arises from improper input validation (CWE-20) during the configuration of an HTTP proxy within the Management Console. An attacker with an editor role in the Management Console can exploit this flaw to execute arbitrary commands, ultimately gaining administrative SSH access to the GitHub Enterprise Server appliance. This level of access allows the attacker to fully control the server, potentially leading to unauthorized code execution, data exfiltration, manipulation of repositories, and disruption of services. Exploitation requires prior access to the GitHub Enterprise Server instance and Management Console with at least editor privileges, meaning the attacker must already have some level of internal access or compromised credentials. The vulnerability was responsibly disclosed through the GitHub Bug Bounty program and fixed in versions 3.11.5, 3.10.7, 3.9.10, and 3.8.15. The CVSS v3.1 score is 9.1 (critical), reflecting the high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, and no user interaction required. No known exploits are currently reported in the wild, but the severity and ease of exploitation make timely patching essential.

Potential Impact

For European organizations using GitHub Enterprise Server, this vulnerability poses a significant risk. GitHub Enterprise Server is widely used by enterprises for source code management, CI/CD pipelines, and collaboration. An attacker exploiting this vulnerability could gain full administrative control over the server, leading to theft or tampering of sensitive intellectual property, insertion of malicious code into software supply chains, disruption of development workflows, and potential lateral movement within corporate networks. Given the critical nature of software supply chain security, exploitation could have cascading effects on software integrity and trust. Organizations in sectors such as finance, healthcare, telecommunications, and government are particularly at risk due to the sensitive nature of their codebases and regulatory requirements. The requirement for editor-level access limits the attack surface but does not eliminate risk, especially in environments with many users or insufficient access controls. The vulnerability’s impact on availability could also disrupt development operations, causing financial and reputational damage.

Mitigation Recommendations

European organizations should immediately verify their GitHub Enterprise Server versions and upgrade to the patched releases (3.11.5, 3.10.7, 3.9.10, or 3.8.15) as applicable. Beyond patching, organizations should audit and restrict Management Console access, ensuring that only trusted personnel have editor or higher roles. Implement strict role-based access controls (RBAC) and regularly review user privileges to minimize the number of users with elevated rights. Enable and monitor detailed logging and alerting on Management Console activities to detect suspicious proxy configuration attempts. Network segmentation should be employed to isolate GitHub Enterprise Servers from broader internal networks, limiting potential lateral movement. Additionally, organizations should conduct internal penetration testing and vulnerability assessments focusing on administrative interfaces. Employ multi-factor authentication (MFA) for all console access to reduce the risk of credential compromise. Finally, integrate GitHub Enterprise Server monitoring with Security Information and Event Management (SIEM) systems to enhance detection capabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_P
Date Reserved
2024-02-08T18:18:47.038Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9817c4522896dcbd75f8

Added to database: 5/21/2025, 9:08:39 AM

Last enriched: 7/5/2025, 12:55:46 AM

Last updated: 8/16/2025, 2:05:02 AM

Views: 24

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats