CVE-2024-53858: Recursive repository cloning can leak authentication tokens to non-GitHub submodule hosts
6.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.12497%
CWE
Published
11/27/2024
Updated
12/2/2024
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/cli/cli/v2 | go | <= 2.62.0 | 2.63.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from GitHub CLI commands (clone/fork/pr checkout) invoking Git with unrestricted credential.helper configurations. The key failure points are: 1) Command implementations that didn't limit credential helper activation to GitHub domains, 2) Credential management logic that leaked enterprise tokens to third-party hosts, and 3) Environment variable handling that inappropriately sourced tokens for non-GitHub operations. The patch in 2.63.0 explicitly restricts credential helper usage to GitHub-controlled domains, confirming these were the vulnerable areas.