CVE-2024-8810
CVE-2024-8810 is a GitHub Enterprise Server vulnerability where a maliciously crafted GitHub App, when installed by an administrator, could unexpectedly escalate its permissions from read to write without explicit organization administrator approval. The vulnerability affected versions prior to 3.14 and was resolved in versions 3.14.1, 3.13.4, 3.12.9, 3.11.15, and 3.10.17. Despite the CVSS score of 0, the SOCRadar Vulnerability Risk Score (SVRS) is 30, indicating a moderate level of risk based on threat intelligence analysis.
This privilege escalation vulnerability allows a bad actor to gain unauthorized write access to an organization's resources. Although exploiting this requires an administrator to install the malicious app, the potential impact on data security and system integrity is significant. Organizations using GitHub Enterprise Server should prioritize patching to the fixed versions to mitigate this risk. The vulnerability was responsibly disclosed through the GitHub Bug Bounty program, highlighting the importance of vulnerability reporting and proactive security measures.
Indicators of Compromise
Exploits
News
Social Media
Affected Software
References
CWE Details
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.