{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-2748","assignerOrgId":"82327ea3-741d-41e4-88f8-2cf9e791e760","state":"PUBLISHED","assignerShortName":"GitHub_P","dateReserved":"2024-03-20T17:04:53.810Z","datePublished":"2024-03-20T23:09:40.032Z","dateUpdated":"2024-08-02T19:20:10.085Z"},"containers":{"cna":{"affected":[{"defaultStatus":"affected","product":"Enterprise Server","vendor":"GitHub ","versions":[{"changes":[{"at":"3.12.1","status":"unaffected"}],"lessThanOrEqual":"3.12.0","status":"affected","version":"3.12","versionType":"semver"}]}],"credits":[{"lang":"en","type":"finder","value":"adrianoapj"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"A Cross Site Request Forgery vulnerability was identified in GitHub Enterprise Server that allowed an attacker to execute unauthorized actions on behalf of an unsuspecting user. A mitigating factor is that user interaction is required. <span style=\"background-color: rgb(252, 252, 252);\">This vulnerability affected GitHub Enterprise Server 3.12.0 and was fixed in versions 3.12.1. This vulnerability was reported via the GitHub Bug Bounty program.&nbsp;<br></span>"}],"value":"A Cross Site Request Forgery vulnerability was identified in GitHub Enterprise Server that allowed an attacker to execute unauthorized actions on behalf of an unsuspecting user. A mitigating factor is that user interaction is required. This vulnerability affected GitHub Enterprise Server 3.12.0 and was fixed in versions 3.12.1. This vulnerability was reported via the GitHub Bug Bounty program. \n"}],"impacts":[{"capecId":"CAPEC-62","descriptions":[{"lang":"en","value":"CAPEC-62 Cross Site Request Forgery"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":4.3,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-352","description":"CWE-352 Cross-Site Request Forgery (CSRF)","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"82327ea3-741d-41e4-88f8-2cf9e791e760","shortName":"GitHub_P","dateUpdated":"2024-03-20T23:09:46.922Z"},"references":[{"url":"https://docs.github.com/en/enterprise-server@3.12/admin/release-notes/#3.12.1"}],"source":{"discovery":"UNKNOWN"},"title":"CSRF vulnerability was identified in GitHub Enterprise Server that allowed performing actions on behalf of a user","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T19:25:41.753Z"},"title":"CVE Program Container","references":[{"url":"https://docs.github.com/en/enterprise-server@3.12/admin/release-notes/#3.12.1","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-08-02T19:19:57.386151Z","id":"CVE-2024-2748","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-08-02T19:20:10.085Z"}}]}}