Miggo Logo

CVE-2024-53858: Recursive repository cloning can leak authentication tokens to non-GitHub submodule hosts

6.5

CVSS Score
3.1

Basic Information

EPSS Score
0.12497%
Published
11/27/2024
Updated
12/2/2024
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/cli/cli/v2go<= 2.62.02.63.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from GitHub CLI commands (clone/fork/pr checkout) invoking Git with unrestricted credential.helper configurations. The key failure points are: 1) Command implementations that didn't limit credential helper activation to GitHub domains, 2) Credential management logic that leaked enterprise tokens to third-party hosts, and 3) Environment variable handling that inappropriately sourced tokens for non-GitHub operations. The patch in 2.63.0 explicitly restricts credential helper usage to GitHub-controlled domains, confirming these were the vulnerable areas.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry * s**urity vuln*r**ility **s ***n i**nti*i** in t** *it*u* *LI t**t *oul* l**k *ut**nti**tion tok*ns w**n *lonin* r*positori*s *ont*inin* `*it` su*mo*ul*s *ost** outsi** o* *it*u*.*om *n* ***.*om. ### **t*ils T*is vuln*r**ility st*ms *

Reasoning

T** vuln*r**ility st*ms *rom *it*u* *LI *omm*n*s (*lon*/*ork/pr ****kout) invokin* *it wit* unr*stri*t** `*r***nti*l.**lp*r` *on*i*ur*tions. T** k*y **ilur* points *r*: *) *omm*n* impl*m*nt*tions t**t *i*n't limit `*r***nti*l` **lp*r **tiv*tion to `*