CVE-2024-10824

An authorization bypass vulnerability was identified in GitHub Enterprise Server that allowed unauthorized internal users to access sensitive secret scanning alert data intended only for business owners. This issue could be exploited only by organization members with a personal access token (PAT) and required that secret scanning be enabled on user-owned repositories. This vulnerability affected GitHub Enterprise Server versions after 3.13.0 but prior to 3.14.0 and was fixed in version 3.13.2.
Configurations

Configuration 1 (hide)

cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*

History

27 Aug 2025, 16:27

Type Values Removed Values Added
CPE cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
First Time Github
Github enterprise Server
References () https://docs.github.com/en/enterprise-server@3.13/admin/release-notes#3.13.2 - () https://docs.github.com/en/enterprise-server@3.13/admin/release-notes#3.13.2 - Release Notes

Information

Published : 2024-11-07 22:15

Updated : 2025-08-27 16:27


NVD link : CVE-2024-10824

Mitre link : CVE-2024-10824

CVE.ORG link : CVE-2024-10824


JSON object : View

Products Affected

github

  • enterprise_server
CWE
CWE-862

Missing Authorization