A Cross Site Request Forgery vulnerability was identified in GitHub Enterprise Server that allowed an attacker to execute unauthorized actions on behalf of an unsuspecting user. A mitigating factor is that user interaction is required. This vulnerability affected GitHub Enterprise Server 3.12.0 and was fixed in versions 3.12.1. This vulnerability was reported via the GitHub Bug Bounty program.
References
Link | Resource |
---|---|
https://docs.github.com/en/enterprise-server@3.12/admin/release-notes/#3.12.1 | Release Notes |
https://docs.github.com/en/enterprise-server@3.12/admin/release-notes/#3.12.1 | Release Notes |
Configurations
History
02 Sep 2025, 14:07
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:github:enterprise_server:3.12.0:*:*:*:*:*:*:* | |
First Time |
Github
Github enterprise Server |
|
References | () https://docs.github.com/en/enterprise-server@3.12/admin/release-notes/#3.12.1 - Release Notes |
Information
Published : 2024-03-21 00:15
Updated : 2025-09-02 14:07
NVD link : CVE-2024-2748
Mitre link : CVE-2024-2748
CVE.ORG link : CVE-2024-2748
JSON object : View
Products Affected
github
- enterprise_server
CWE
CWE-352
Cross-Site Request Forgery (CSRF)