<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[GitHub 高危 RCE 漏洞 CVE-2026-3854：单条 git push 即可远程执行代码，88% Enterprise Server 实例曾受影响]]></title><description><![CDATA[<p dir="auto"><a href="http://GitHub.com" target="_blank" rel="noopener noreferrer nofollow ugc">GitHub.com</a> 与 GitHub Enterprise Server 被披露存在高危远程代码执行漏洞 CVE-2026-3854（CVSS 8.7），Wiz 安全研究团队 3 月 4 日上报，GitHub 在 2 小时内向 <a href="http://GitHub.com" target="_blank" rel="noopener noreferrer nofollow ugc">GitHub.com</a> 部署修复，Enterprise Server 修复版本为 3.14.25、3.15.20、3.16.16、3.17.13、3.18.8、3.19.4、3.20.0 及以上。漏洞根因是 git push 操作时用户提供的 push option 值未经过滤即被拼接进 GitHub 内部 X-Stat 头部，而该内部头部使用分号作为分隔符——同样可出现在用户输入中——攻击者由此能注入额外的元数据字段。Wiz 描述利用链由三段注入串成：先注入非生产环境的 <code>rails_env</code> 绕过沙箱，再注入 <code>custom_hooks_dir</code> 重定向 hook 目录，最后通过 <code>repo_pre_receive_hooks</code> 配合路径遍历以 git 用户身份执行任意命令。任何对仓库具备 push 权限的认证用户均可触发。</p>
<p dir="auto">漏洞影响范围远超表面：在 <a href="http://GitHub.com" target="_blank" rel="noopener noreferrer nofollow ugc">GitHub.com</a> 的多租户架构下，攻击者一旦在共享存储节点上获得代码执行，即可跨租户读取数百万仓库的内容，与组织或用户归属无关。Wiz 描述其"利用难度极低"，公开披露时仍有约 88% 的 Enterprise Server 实例处于易受攻击状态。<a href="http://GitHub.com" target="_blank" rel="noopener noreferrer nofollow ugc">GitHub.com</a> 看似多了一道"Enterprise 模式标志为 false 时 custom hooks 路径不激活"的保护，但该标志同样通过 X-Stat 头部传递、可被同一注入手法覆写，因此 SaaS 实例同样可被攻陷。GitHub 首席信息安全官 Alexis Wales 在官方博客确认尚未发现该漏洞被恶意利用的证据，并强调该事件再次提醒"使用不同语言开发的多个内部服务通过共享内部协议传递数据时，每个服务对数据格式的隐含假设本身就是关键攻击面"。Wiz 建议所有运营多服务架构的团队系统性审计用户可控输入在内部协议中的流动路径，尤其是当安全相关配置直接派生自共享数据格式时。</p>
<p dir="auto"><a href="https://thehackernews.com/2026/04/researchers-discover-critical-github.html" target="_blank" rel="noopener noreferrer nofollow ugc">The Hacker News</a> | <a href="https://github.blog/security/securing-the-git-push-pipeline-responding-to-a-critical-remote-code-execution-vulnerability/" target="_blank" rel="noopener noreferrer nofollow ugc">GitHub Blog</a> | <a href="https://www.wiz.io/blog/github-rce-vulnerability-cve-2026-3854" target="_blank" rel="noopener noreferrer nofollow ugc">Wiz</a> | <a href="https://www.securityweek.com/critical-github-vulnerability-exposed-millions-of-repositories/" target="_blank" rel="noopener noreferrer nofollow ugc">SecurityWeek</a> | <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-3854" target="_blank" rel="noopener noreferrer nofollow ugc">NVD</a></p>
<p dir="auto"></p><div class="card col-md-9 col-lg-6 position-relative link-preview p-0">



<a href="https://thehackernews.com/2026/04/researchers-discover-critical-github.html" title="Researchers Discover Critical GitHub CVE-2026-3854 RCE Flaw Exploitable via Single Git Push">
<img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgztlzahKA2HwUQiNDerhbX2l415JinNIW5jaU5tgskPVHqpMhba_NorYL9SSWRzLdSPjSnsxZKQic97f8H2Bx2G0Dsjb58dcdFuZoL0c5Gno3BVvYa4vi62_PNr1Qh-kBYED7YbTPw3fqQklMmnoPV0b1KYaienKHzIAtBuktMqyVCxGU0u8Hkd-zzYeNU/s1600/github.jpg" class="card-img-top not-responsive" style="max-height:15rem" alt="Link Preview Image" />
</a>



<div class="card-body">
<h5 class="card-title">
<a class="text-decoration-none" href="https://thehackernews.com/2026/04/researchers-discover-critical-github.html">
Researchers Discover Critical GitHub CVE-2026-3854 RCE Flaw Exploitable via Single Git Push
</a>
</h5>
<p class="card-text line-clamp-3">CVE-2026-3854 (CVSS 8.7) enabled GitHub RCE via git push, risking cross-tenant access to millions of repositories.</p>
</div>
<a href="https://thehackernews.com/2026/04/researchers-discover-critical-github.html" class="card-footer text-body-secondary small d-flex gap-2 align-items-center lh-2">



<img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQQyjwPYjJP0wddSEB8Dlpr3dlnQUs52-WmlrZfqJoBPeOvv2Zoqlq-FhEAz_Xeprj_mtrI1MGCW1JS840JUjVEK6VoNe6zCNNTw_7YmyvNmf3E5pprZ3zqP8lszq74Wt97SvbJo5yeuyep0U6-nGs0vdarg4_WUrc5r6L0ML0xE-BsPipJd2-1PMHTvO1/s32-e365/thn.jpg" alt="favicon" class="not-responsive overflow-hiddden" style="max-width:21px;max-height:21px" />

















<p class="d-inline-block text-truncate mb-0">The Hacker News <span class="text-secondary">(thehackernews.com)</span></p>
</a>
</div><p></p>
<p dir="auto"></p><div class="card col-md-9 col-lg-6 position-relative link-preview p-0">



<a href="https://github.blog/security/securing-the-git-push-pipeline-responding-to-a-critical-remote-code-execution-vulnerability/" title="Securing the git push pipeline: Responding to a critical remote code execution vulnerability">
<img src="https://github.blog/wp-content/uploads/2026/01/generic-security-logo-blocks-github.png" class="card-img-top not-responsive" style="max-height:15rem" alt="Link Preview Image" />
</a>



<div class="card-body">
<h5 class="card-title">
<a class="text-decoration-none" href="https://github.blog/security/securing-the-git-push-pipeline-responding-to-a-critical-remote-code-execution-vulnerability/">
Securing the git push pipeline: Responding to a critical remote code execution vulnerability
</a>
</h5>
<p class="card-text line-clamp-3">How we validated, fixed, and investigated a critical vulnerability in under two hours, and confirmed no exploitation.</p>
</div>
<a href="https://github.blog/security/securing-the-git-push-pipeline-responding-to-a-critical-remote-code-execution-vulnerability/" class="card-footer text-body-secondary small d-flex gap-2 align-items-center lh-2">



<img src="https://github.githubassets.com/favicon.ico" alt="favicon" class="not-responsive overflow-hiddden" style="max-width:21px;max-height:21px" />









<p class="d-inline-block text-truncate mb-0">The GitHub Blog <span class="text-secondary">(github.blog)</span></p>
</a>
</div><p></p>
<p dir="auto"></p><div class="card col-md-9 col-lg-6 position-relative link-preview p-0">



<a href="https://www.wiz.io/blog/github-rce-vulnerability-cve-2026-3854" title="GitHub RCE Vulnerability: CVE-2026-3854 Breakdown | Wiz Blog">
<img src="https://www.datocms-assets.com/75231/1777300906-github-2x-100-1.jpg?fm=webp" class="card-img-top not-responsive" style="max-height:15rem" alt="Link Preview Image" />
</a>



<div class="card-body">
<h5 class="card-title">
<a class="text-decoration-none" href="https://www.wiz.io/blog/github-rce-vulnerability-cve-2026-3854">
GitHub RCE Vulnerability: CVE-2026-3854 Breakdown | Wiz Blog
</a>
</h5>
<p class="card-text line-clamp-3">A CVSS 8.7 vulnerability in GitHub Enterprise Server allows remote code execution. Read the threat brief and find vulnerable GHES instances from Wiz.</p>
</div>
<a href="https://www.wiz.io/blog/github-rce-vulnerability-cve-2026-3854" class="card-footer text-body-secondary small d-flex gap-2 align-items-center lh-2">



<img src="https://www.wiz.io/favicon.png" alt="favicon" class="not-responsive overflow-hiddden" style="max-width:21px;max-height:21px" />



<p class="d-inline-block text-truncate mb-0">wiz.io <span class="text-secondary">(www.wiz.io)</span></p>
</a>
</div><p></p>
<p dir="auto"></p><div class="card col-md-9 col-lg-6 position-relative link-preview p-0">



<a href="https://www.securityweek.com/critical-github-vulnerability-exposed-millions-of-repositories/" title="Critical GitHub Vulnerability Exposed Millions of Repositories">
<img src="https://www.securityweek.com/wp-content/uploads/2024/03/GitHub.jpeg" class="card-img-top not-responsive" style="max-height:15rem" alt="Link Preview Image" />
</a>



<div class="card-body">
<h5 class="card-title">
<a class="text-decoration-none" href="https://www.securityweek.com/critical-github-vulnerability-exposed-millions-of-repositories/">
Critical GitHub Vulnerability Exposed Millions of Repositories
</a>
</h5>
<p class="card-text line-clamp-3">Wiz discovered a critical remote code execution vulnerability in GitHub that exposed millions of repositories.</p>
</div>
<a href="https://www.securityweek.com/critical-github-vulnerability-exposed-millions-of-repositories/" class="card-footer text-body-secondary small d-flex gap-2 align-items-center lh-2">



<img src="https://www.securityweek.com/favicon.ico" alt="favicon" class="not-responsive overflow-hiddden" style="max-width:21px;max-height:21px" />









<p class="d-inline-block text-truncate mb-0">SecurityWeek <span class="text-secondary">(www.securityweek.com)</span></p>
</a>
</div><p></p>
]]></description><link>https://welinux.com//topic/99/github-高危-rce-漏洞-cve-2026-3854-单条-git-push-即可远程执行代码-88-enterprise-server-实例曾受影响</link><generator>RSS for Node</generator><lastBuildDate>Sat, 02 May 2026 21:06:39 GMT</lastBuildDate><atom:link href="https://welinux.com//topic/99.rss" rel="self" type="application/rss+xml"/><pubDate>Wed, 29 Apr 2026 08:36:23 GMT</pubDate><ttl>60</ttl></channel></rss>