Command Injection Vulnerability Patched in GitHub Enterprise Server

CVSScvssV3_1: 9.1

GitHub Enterprise Server is a private version of the popular GitHub code hosting platform used by many organizations. A recent security issue was discovered that could allow an attacker to gain administrative access to GitHub Enterprise Server instances if they had an editor role in the management console.

The vulnerability was a command injection flaw that occurred when configuring audit log forwarding using nomad templates in the management console. A malicious actor with editor permissions could craft a template payload that executed arbitrary commands with root privileges on the server when processed. This would essentially give the attacker full control over the GitHub Enterprise instance.

The good news is that GitHub has released patches to address this issue in versions 3.11.5, 3.10.7, 3.9.10, and 3.8.15 of their Enterprise Server software. Organizations using older versions are highly recommended to update immediately. Administrators should also review the access permissions of all users and roles in their management consoles to ensure only authorized personnel have editor or higher access.

Staying up-to-date on software and limiting administrative access are important steps all GitHub Enterprise Server users can take to protect their private code repositories and development infrastructure from potential exploitation through this or other vulnerabilities in the future.