Researchers Discover Critical GitHub CVE-2026-3854 RCE Flaw Exploitable via Single Git Push
嗯,用户让我帮忙总结一篇文章,控制在一百个字以内,而且不需要特定的开头。首先,我需要仔细阅读这篇文章,理解其主要内容。 文章讲的是GitHub的一个严重安全漏洞,编号CVE-2026-3854,CVSS评分8.7。这个漏洞允许经过身份验证的用户通过一次git push命令实现远程代码执行。漏洞的原因是用户提供的git push选项没有被正确清理,导致注入攻击。 然后,文章提到Wiz公司发现了这个漏洞,并在3月4日报告给了GitHub。GitHub迅速修复了这个问题,并且已经发布了多个版本的企业服务器来解决这个问题。漏洞影响了GitHub.com和多个企业版本,但没有证据显示被恶意利用过。 接下来,我需要把这些信息浓缩到100字以内。要突出漏洞的严重性、影响范围、原因以及修复情况。同时要保持语言简洁明了。 可能会这样组织:GitHub发现一个严重漏洞(CVE-2026-3854),允许攻击者通过git push执行远程代码。问题出在git push选项未被清理,导致注入攻击。Wiz公司发现并报告后,GitHub迅速修复,并发布了多个版本的企业服务器补丁。漏洞影响多个平台,但未被恶意利用。 检查一下字数是否在限制内,并确保所有关键点都被涵盖。 </think> GitHub披露了一个严重安全漏洞(CVE-2026-3854),允许攻击者通过一次"git push"命令实现远程代码执行。该漏洞源于用户提供的push选项未被充分清理,导致命令注入攻击。该问题影响GitHub.com和GitHub Enterprise Server等多个版本,已由Wiz公司发现并修复。 2026-4-28 18:19:0 Author: thehackernews.com(查看原文) 阅读量:21 收藏

Vulnerability / Software Security

Cybersecurity researchers have disclosed details of a critical security vulnerability impacting GitHub.com and GitHub Enterprise Server that could allow an authenticated user to obtain remote code execution with a single "git push" command.

The flaw, tracked as CVE-2026-3854 (CVSS score: 8.7), is a case of command injection that could allow an attacker with push access to a repository to achieve remote code execution on the instance.

"During a git push operation, user-supplied push option values were not properly sanitized before being included in internal service headers," per a GitHub advisory for the vulnerability. "Because the internal header format used a delimiter character that could also appear in user input, an attacker could inject additional metadata fields through crafted push option values."

Google-owned cloud security firm Wiz has been credited with discovering and reporting the issue on March 4, 2026, with GitHub validating and deploying a fix to GitHub.com within two hours.

The vulnerability has also been addressed in GitHub Enterprise Server versions 3.14.25, 3.15.20, 3.16.16, 3.17.13, 3.18.8, 3.19.4, 3.20.0, or later. There is no evidence that the issue was ever exploited in a malicious context.

According to GitHub, the issue affects GitHub.com, GitHub Enterprise Cloud, GitHub Enterprise Cloud with Data Residency, GitHub Enterprise Cloud with Enterprise Managed Users, and GitHub Enterprise Server.

At its core, the problem stems from the fact that user-supplied git push options are not adequately sanitized before the values were incorporated into the internal X-Stat header. Because the internal metadata format relies on a semicolon as a delimiter character that could also appear in the user input, a bad actor could exploit this oversight to inject arbitrary commands and have them executed.

"By chaining several injected values together, the researchers demonstrated that an attacker could override the environment the push was processed in, bypass sandboxing protections that normally constrain hook execution, and ultimately execute arbitrary commands on the server," GitHub's Chief Information Security Officer, Alexis Wales, said.

Wiz, in a coordinated announcement, noted that the issue is "remarkably easy" to exploit, adding that it allows remote code execution on shared storage nodes. About 88% of instances are currently vulnerable to the issue at the time of public disclosure. The remote code execution chain strings together three injections -

  • Inject a non-production rails_env value to bypass the sandbox
  • Inject custom_hooks_dir to control to redirectthe hook directory
  • Inject repo_pre_receive_hooks with a crafted hook entry that triggers path traversal to execute arbitrary commands as the git user

"With unsandboxed code execution as the git user, we had full control over the GHES instance, including filesystem read/write access and visibility into internal service configuration," Wiz security researcher Sagi Tzadik said.

As for GitHub.com, an enterprise mode flag – that's set to "true" for GitHub Enterprise Server – defaults to "false," rendering the custom hooks path inactive. But since this flag is also passed in the X-Stat header, it's equally injectable using the same mechanism, thereby resulting in code execution on GitHub.com as well.

To make matters worse, given GitHub's multi-tenant architecture and its shared backend infrastructure, the company pointed out that obtaining code execution on GitHub.com enabled cross-tenant exposure, effectively allowing an attacker to read millions of repositories on the shared storage node, irrespective of the organization or user.

In light of the severity of CVE-2026-3854, users are advised to apply the update immediately for optimal protection.

"A single git push command was enough to exploit a flaw in GitHub's internal protocol and achieve code execution on backend infrastructure," Wiz said. "When multiple services written in different languages pass data through a shared internal protocol, the assumptions each service makes about that data become a critical attack surface."

"We encourage teams building multi-service architectures to audit how user-controlled input flows through internal protocols – especially where security-critical configuration is derived from shared data formats."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/04/researchers-discover-critical-github.html
如有侵权请联系:admin#unsafe.sh