An incorrect authorization vulnerability was identified in GitHub Enterprise Server that allowed an attacker to create new branches in public repositories and run arbitrary GitHub Actions workflows with permissions from the GITHUB_TOKEN. To exploit this vulnerability, an attacker would need access to the Enterprise Server. This vulnerability affected all versions of GitHub Enterprise Server after 3.8 and prior to 3.12, and was fixed in versions 3.9.10, 3.10.7, 3.11.5. This vulnerability was reported via the GitHub Bug Bounty program.
                
            Metrics
Affected Vendors & Products
References
        History
                    Thu, 23 Jan 2025 20:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Github Github enterprise Server | |
| CPEs | cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:* | |
| Vendors & Products | Github Github enterprise Server | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: GitHub_P
Published: 2024-02-14T20:04:47.981Z
Updated: 2024-08-01T18:40:21.100Z
Reserved: 2024-02-13T20:04:24.216Z
Link: CVE-2024-1482
 Vulnrichment
                        Vulnrichment
                    Updated: 2024-08-01T18:40:21.100Z
 NVD
                        NVD
                    Status : Analyzed
Published: 2024-02-14T20:15:45.690
Modified: 2025-01-23T19:53:54.957
Link: CVE-2024-1482
 Redhat
                        Redhat
                    No data.