GitHub Enterprise Server <3.14 Ruleset Change Exposes Sensitive Info
CVE-2024-6336 Published on July 16, 2024

Security misconfiguration was identified in GitHub Enterprise Server that allowed sensitive data exposure
A Security Misconfiguration vulnerability in GitHub Enterprise Server allowed sensitive information disclosure to unauthorized users in GitHub Enterprise Server by exploiting organization ruleset feature. This attack required an organization member to explicitly change the visibility of a dependent repository from private to public. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.14 and was fixed in versions 3.13.1, 3.12.6, 3.11.12, 3.10.14, and 3.9.17. This vulnerability was reported via the GitHub Bug Bounty program.

NVD

Weakness Type

What is an Information Disclosure Vulnerability?

The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.

CVE-2024-6336 has been classified to as an Information Disclosure vulnerability or weakness.


Products Associated with CVE-2024-6336

Want to know whenever a new CVE is published for github Enterprise Server? stack.watch will email you.

 

Affected Versions

GitHub Enterprise Server:

Exploit Probability

EPSS
0.39%
Percentile
59.67%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.