Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2024-0507", "assignerOrgId": "82327ea3-741d-41e4-88f8-2cf9e791e760", "state": "PUBLISHED", "assignerShortName": "GitHub_P", "dateReserved": "2024-01-12T15:20:54.402Z", "datePublished": "2024-01-16T18:51:28.374Z", "dateUpdated": "2024-10-22T15:50:55.430Z"}, "containers": {"cna": {"affected": [{"defaultStatus": "unaffected", "product": "Enterprise Server", "vendor": "GitHub", "versions": [{"lessThanOrEqual": "3.8.12", "status": "affected", "version": "3.8.0", "versionType": "semver"}, {"lessThanOrEqual": "3.9.7", "status": "affected", "version": "3.9.0", "versionType": "semver"}, {"lessThanOrEqual": "3.10.4", "status": "affected", "version": "3.10.0", "versionType": "semver"}, {"lessThanOrEqual": "3.11.2", "status": "affected", "version": "3.11.0", "versionType": "semver"}]}], "credits": [{"lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Imre Rad"}], "descriptions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "An attacker with access to a Management Console user account with the editor role could escalate privileges through a command injection vulnerability in the Management Console. This vulnerability affected all versions of GitHub Enterprise Server and was fixed in versions 3.11.3, 3.10.5, 3.9.8, and 3.8.13 This vulnerability was reported via the GitHub Bug Bounty program."}], "value": "An attacker with access to a Management Console user account with the editor role could escalate privileges through a command injection vulnerability in the Management Console. This vulnerability affected all versions of GitHub Enterprise Server and was fixed in versions 3.11.3, 3.10.5, 3.9.8, and 3.8.13 This vulnerability was reported via the GitHub Bug Bounty program."}], "impacts": [{"capecId": "CAPEC-233", "descriptions": [{"lang": "en", "value": "CAPEC-233 Privilege Escalation"}]}], "metrics": [{"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1"}, "format": "CVSS", "scenarios": [{"lang": "en", "value": "GENERAL"}]}], "problemTypes": [{"descriptions": [{"cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"orgId": "82327ea3-741d-41e4-88f8-2cf9e791e760", "shortName": "GitHub_P", "dateUpdated": "2024-01-16T18:51:28.374Z"}, "references": [{"url": "https://docs.github.com/en/enterprise-server@3.11/admin/release-notes#3.11.3"}, {"url": "https://docs.github.com/en/enterprise-server@3.10/admin/release-notes#3.10.5"}, {"url": "https://docs.github.com/en/enterprise-server@3.9/admin/release-notes#3.9.8"}, {"url": "https://docs.github.com/en/enterprise-server@3.8/admin/release-notes#3.8.13"}], "source": {"discovery": "EXTERNAL"}, "title": "Privilege Escalation by Code Injection in the Management Console in GitHub Enterprise Server", "x_generator": {"engine": "Vulnogram 0.1.0-dev"}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-01T18:11:34.952Z"}, "title": "CVE Program Container", "references": [{"url": "https://docs.github.com/en/enterprise-server@3.11/admin/release-notes#3.11.3", "tags": ["x_transferred"]}, {"url": "https://docs.github.com/en/enterprise-server@3.10/admin/release-notes#3.10.5", "tags": ["x_transferred"]}, {"url": "https://docs.github.com/en/enterprise-server@3.9/admin/release-notes#3.9.8", "tags": ["x_transferred"]}, {"url": "https://docs.github.com/en/enterprise-server@3.8/admin/release-notes#3.8.13", "tags": ["x_transferred"]}]}, {"affected": [{"vendor": "github", "product": "enterprise_server", "cpes": ["cpe:2.3:a:github:enterprise_server:-:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "3.8.0", "status": "affected", "lessThanOrEqual": "3.8.12", "versionType": "semver"}, {"version": "3.9.0", "status": "affected", "lessThanOrEqual": "3.9.7", "versionType": "semver"}, {"version": "3.10.0", "status": "affected", "lessThanOrEqual": "3.10.4", "versionType": "semver"}, {"version": "3.11.0", "status": "affected", "lessThanOrEqual": "3.11.2", "versionType": "semver"}]}], "metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2024-10-22T15:45:43.280692Z", "id": "CVE-2024-0507", "options": [{"Exploitation": "none"}, {"Automatable": "no"}, {"Technical Impact": "total"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-10-22T15:50:55.430Z"}}]}}