Skip to main content

CVE-2024-1374: CWE-20 Improper Input Validation in GitHub Enterprise Server

Critical
VulnerabilityCVE-2024-1374cvecve-2024-1374cwe-20
Published: Tue Feb 13 2024 (02/13/2024, 18:54:18 UTC)
Source: CVE
Vendor/Project: GitHub
Product: Enterprise Server

Description

A command injection vulnerability was identified in GitHub Enterprise Server that allowed an attacker with an editor role in the Management Console to gain admin SSH access to the appliance via nomad templates when configuring audit log forwarding. Exploitation of this vulnerability required access to the GitHub Enterprise Server instance and access to the Management Console with the editor role. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.12 and was fixed in versions 3.11.5, 3.10.7, 3.9.10, and 3.8.15. This vulnerability was reported via the GitHub Bug Bounty program https://bounty.github.com .

AI-Powered Analysis

AILast updated: 07/05/2025, 00:56:09 UTC

Technical Analysis

CVE-2024-1374 is a critical command injection vulnerability identified in GitHub Enterprise Server, specifically affecting versions prior to 3.12 (notably 3.8.0, 3.9.0, 3.10.0, and 3.11.0). The vulnerability arises due to improper input validation (CWE-20) in the Management Console's handling of nomad templates used for configuring audit log forwarding. An attacker who has at least editor-level privileges within the Management Console can exploit this flaw to execute arbitrary commands, ultimately gaining administrative SSH access to the underlying appliance hosting the GitHub Enterprise Server. This escalation from editor to admin-level access is significant because it allows full control over the server environment, potentially compromising all hosted repositories and sensitive organizational data. The vulnerability does not require user interaction but does require prior authenticated access with editor privileges, which limits the attack surface to insiders or attackers who have already breached initial defenses. The flaw was responsibly disclosed via GitHub's Bug Bounty program and fixed in versions 3.11.5, 3.10.7, 3.9.10, and 3.8.15. The CVSS v3.1 base score is 9.1, reflecting the critical nature of the vulnerability with network attack vector, low attack complexity, high privileges required, no user interaction, and complete impact on confidentiality, integrity, and availability. No known exploits in the wild have been reported yet, but the severity and ease of exploitation by privileged users make timely patching essential.

Potential Impact

For European organizations using GitHub Enterprise Server, this vulnerability poses a severe risk. Organizations relying on GitHub Enterprise for source code management, CI/CD pipelines, and internal collaboration could face full compromise of their development infrastructure if exploited. Attackers gaining admin SSH access can manipulate repositories, inject malicious code, exfiltrate intellectual property, and disrupt development workflows. This can lead to significant financial losses, reputational damage, and regulatory compliance violations, especially under GDPR where data breaches must be reported. The requirement for editor-level access means insider threats or attackers who have already compromised user credentials pose the greatest risk. Given the critical role of software supply chains in European industries, including finance, manufacturing, and government sectors, exploitation could have cascading effects on software integrity and operational continuity.

Mitigation Recommendations

European organizations should immediately verify their GitHub Enterprise Server versions and upgrade to the patched releases (3.11.5, 3.10.7, 3.9.10, or 3.8.15) as applicable. Beyond patching, organizations should enforce strict access controls and audit policies to limit editor role assignments to trusted personnel only. Implement multi-factor authentication (MFA) for Management Console access to reduce the risk of credential compromise. Regularly monitor audit logs for unusual activities related to nomad template configurations or SSH access attempts. Employ network segmentation to isolate the GitHub Enterprise Server appliance from broader internal networks, minimizing lateral movement if compromised. Additionally, conduct internal security training to raise awareness about the risks of privilege escalation and ensure rapid incident response capabilities are in place to detect and contain potential exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_P
Date Reserved
2024-02-08T20:05:31.488Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9817c4522896dcbd7600

Added to database: 5/21/2025, 9:08:39 AM

Last enriched: 7/5/2025, 12:56:09 AM

Last updated: 7/26/2025, 7:38:38 PM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats