CVE-2012-2055

GitHub Enterprise before 20120304 does not properly restrict the use of a hash to provide values for a model's attributes, which allows remote attackers to set the public_key[user_id] value via a modified URL for the public-key update form, related to a "mass assignment" vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:github:github:*:*:*:*:enterprise:*:*:*

History

21 Jan 2024, 02:39

Type Values Removed Values Added
First Time Github github
References () http://homakov.blogspot.com/2012/03/how-to.html - Exploit () http://homakov.blogspot.com/2012/03/how-to.html - Issue Tracking
References () http://lwn.net/Articles/488702/ - () http://lwn.net/Articles/488702/ - Third Party Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/74812 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/74812 - Third Party Advisory, VDB Entry
References () https://github.com/blog/1068-public-key-security-vulnerability-and-mitigation - () https://github.com/blog/1068-public-key-security-vulnerability-and-mitigation - Vendor Advisory
CWE CWE-255 CWE-913
CPE cpe:2.3:a:github:github_enterprise:*:*:*:*:*:*:*:* cpe:2.3:a:github:github:*:*:*:*:enterprise:*:*:*
CVSS v2 : 5.0
v3 : unknown
v2 : 5.0
v3 : 7.5

Information

Published : 2012-04-05 14:55

Updated : 2024-01-21 02:39


NVD link : CVE-2012-2055

Mitre link : CVE-2012-2055

CVE.ORG link : CVE-2012-2055


JSON object : View

Products Affected

github

  • github
CWE
CWE-913

Improper Control of Dynamically-Managed Code Resources