CVE-2024-0200 Scanner
CVE-2024-0200 Scanner - Remote Code Execution (RCE) vulnerability in GitHub Enterprise Server
Short Info
Level
Critical
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
25 days 16 hours
Scan only one
URL
Toolbox
-
GitHub Enterprise Server is widely used by organizations for managing source code repositories. It provides tools for code collaboration, review, and version control, making it essential in software development environments. Organizations use GitHub Enterprise Server to host repositories securely within their own infrastructure, allowing tighter integration with existing systems and governance processes. The platform supports multiple programming languages and offers integrations with various development tools, making it flexible for diverse development environments. GitHub Enterprise Server is popular among enterprises that want to take advantage of GitHub's powerful tools while maintaining control over their data. It is designed to handle large teams and projects, supporting collaboration and code management on a large scale.
The vulnerability detected in GitHub Enterprise Server is a critical Remote Code Execution (RCE) issue. This flaw allows attackers to execute arbitrary code on the server, potentially leading to full system compromise. The vulnerability is due to an unsafe reflection mechanism that permits reflection injection, putting user accounts with organization owner roles at risk. Exploiting this vulnerability requires the attacker to be authenticated on the system with the necessary organization owner permissions. This vulnerability significantly impacts the security posture of affected systems, requiring immediate attention and remediation from the administrators. It's crucial to update to safe versions to mitigate the risk.
The vulnerability hinges on an unsafe reflection mechanism, where user-controlled input is executed, leading to Remote Code Execution. Attackers exploit this by accessing endpoints like '/api/v3/user/orgs' and '/api/v3/orgs/{{org_name}}/memberships/{{username}}' to gather data or elevate privileges. The use of 'authenticity_token' in '/session' endpoints and 'ENTERPRISE_SESSION_SECRET' from specific paths can further the exploit. Crafting malicious requests with these endpoints allows attackers to inject arbitrary code, leading to system compromise. The vulnerability was discovered in all versions prior to 3.12, emphasizing the need for updating to patched versions like 3.8.13 and above. Careful management of access tokens and review of server logs can help detect signs of exploitation.
If exploited, the RCE vulnerability can have severe consequences. Attackers could gain access to sensitive data stored within the GitHub Enterprise Server, potentially stealing or altering code repositories. A successful exploit could also result in unauthorized administrative actions, including the creation or deletion of repositories and changes to organizational settings. Data integrity and confidentiality could be jeopardized, posing risks to downstream workflows and operations. Furthermore, attackers could establish persistent backdoors, leading to prolonged unauthorized access. Immediate patching and remediation measures are necessary to prevent these potential effects.
REFERENCES
- https://starlabs.sg/blog/2024/04-sending-myself-github-com-environment-variables-and-ghes-shell/
- https://blog.convisoappsec.com/en/analysis-of-github-enterprise-vulnerabilities-cve-2024-0507-cve-2024-0200/
- https://docs.github.com/en/[email protected]/admin/release-notes#3.10.5
- https://docs.github.com/en/[email protected]/admin/release-notes#3.3
- https://docs.github.com/en/[email protected]/admin/release-notes#3.8.13