Seralys’ Post

Wiz Research Team just disclosed a critical RCE in GitHub's internal git push pipeline affecting both GitHub.com and GitHub Enterprise Server (GHES) (CVE-2026-3854). git push options are embedded verbatim into an internal X-Stat header without sanitizing semicolons. Since the header parser uses last-write-wins semantics, an authenticated user can inject arbitrary key=value fields by including a semicolon in a push option value. RCE can be achieved by chaining three injected fields together: - rails_env: bypasses the hook execution sandbox - custom_hooks_dir: redirects the hook script lookup path - repo_pre_receive_hooks: injects a hook definition with path traversal to an arbitrary binary On GHES, RCE as the git service user means full server compromise. Patch your GHES now and check /var/log/github-audit.log for push operations containing ";" in push options

To view or add a comment, sign in

Explore content categories