CVSS 3.1 Score 6.3 of 10 (medium)


Published Feb 13, 2024


CVE-2024-1082 is a path traversal vulnerability found in GitHub Enterprise Server. This vulnerability allows an attacker to gain unauthorized read access to files by deploying symbolic links to a GitHub Pages site with a specially crafted artifact tarball. To exploit this vulnerability, the attacker would need permission to create and build a GitHub Pages site on the affected server. The vulnerability affects all versions of GitHub Enterprise Server prior to 3.12 and has been fixed in versions 3.8.15, 3.9.10, 3.10.7, and 3.11.5. The potential danger is classified as medium severity, with low privileges required for exploitation and high impact on confidentiality of data stored in the affected files.

Leverage our Vulnerability Intelligence module to secure your systems now - get detailed insights on CVE-2024-37364. Book your demo today.


Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2024-1082 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options