U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2024-0200

Change History

New CVE Received by NIST 1/16/2024 2:15:08 PM

Action Type Old Value New Value
Added CVSS V3.1

								
							
							
						
GitHub, Inc. (Products Only) AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:L
Added CWE

								
							
							
						
GitHub, Inc. (Products Only) CWE-470
Added Description

								
							
							
						
An unsafe reflection vulnerability was identified in GitHub Enterprise Server that could lead to reflection injection. This vulnerability could lead to the execution of user-controlled methods and remote code execution. To exploit this bug, an actor would need to be logged into an account on the GHES instance with the organization owner role. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.12 and was fixed in versions 3.8.13, 3.9.8, 3.10.5, and 3.11.3. This vulnerability was reported via the GitHub Bug Bounty program.

Added Reference

								
							
							
						
GitHub, Inc. (Products Only) https://docs.github.com/en/enterprise-server@3.10/admin/release-notes#3.10.5 [No types assigned]
Added Reference

								
							
							
						
GitHub, Inc. (Products Only) https://docs.github.com/en/enterprise-server@3.11/admin/release-notes#3.11.3 [No types assigned]
Added Reference

								
							
							
						
GitHub, Inc. (Products Only) https://docs.github.com/en/enterprise-server@3.8/admin/release-notes#3.8.13 [No types assigned]
Added Reference

								
							
							
						
GitHub, Inc. (Products Only) https://docs.github.com/en/enterprise-server@3.9/admin/release-notes#3.9.8 [No types assigned]