CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2024-1082: Path traversal vulnerability in GitHub Enterprise Server that allowed arbitrary file read with a specially crafted GitHub Pages artifact upload

6.3 CVSS

Description

A path traversal vulnerability was identified in GitHub Enterprise Server that allowed an attacker to gain unauthorized read permission to files by deploying arbitrary symbolic links to a GitHub Pages site with a specially crafted artifact tarball. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.12 and was fixed in versions 3.8.15, 3.9.10, 3.10.7, 3.11.5. This vulnerability was reported via the GitHub Bug Bounty program.

Classification

CVE ID: CVE-2024-1082

CVSS Base Severity: MEDIUM

CVSS Base Score: 6.3

CVSS Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N

Problem Types

CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Affected Products

Vendor: GitHub

Product: Enterprise Server

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.34% (probability of being exploited)

EPSS Percentile: 55.97% (scored less or equal to compared to others)

EPSS Date: 2025-06-07 (when was this score calculated)

Stakeholder-Specific Vulnerability Categorization (SSVC)

SSVC Exploitation: none

SSVC Technical Impact: partial

SSVC Automatable: false

References

https://nvd.nist.gov/vuln/detail/CVE-2024-1082
https://docs.github.com/en/[email protected]/admin/release-notes#3.8.15
https://docs.github.com/en/[email protected]/admin/release-notes#3.9.10
https://docs.github.com/en/[email protected]/admin/release-notes#3.10.7
https://docs.github.com/en/[email protected]/admin/release-notes#3.11.5

Timeline