Unknown
CVE-2024-53859
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
Unknown
(0 users assessed)Unknown
(0 users assessed)Unknown
Unknown
Unknown
CVE-2024-53859
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
go-gh is a Go module for interacting with the gh
utility and the GitHub API from the command line. A security vulnerability has been identified in go-gh
that could leak authentication tokens intended for GitHub hosts to non-GitHub hosts when within a codespace. go-gh
sources authentication tokens from different environment variables depending on the host involved: 1. GITHUB_TOKEN
, GH_TOKEN
for GitHub.com and ghe.com and 2. GITHUB_ENTERPRISE_TOKEN
, GH_ENTERPRISE_TOKEN
for GitHub Enterprise Server. Prior to version 2.11.1
, auth.TokenForHost
could source a token from the GITHUB_TOKEN
environment variable for a host other than GitHub.com or ghe.com when within a codespace. In version 2.11.1
, auth.TokenForHost
will only source a token from the GITHUB_TOKEN
environment variable for GitHub.com or ghe.com hosts. Successful exploitation could send authentication token to an unintended host. This issue has been addressed in version 2.11.1 and all users are advised to upgrade. Users are also advised to regenerate authentication tokens and to review their personal security log and any relevant audit logs for actions associated with their account or enterprise.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
- cli
Products
- go-gh
References
Miscellaneous
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: