A path traversal vulnerability was identified in GitHub Enterprise Server that allowed arbitrary file reading when building a GitHub Pages site. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance. This vulnerability affected all versions of GitHub Enterprise Server since 3.7 and was fixed in version 3.7.6. This vulnerability was reported via the GitHub Bug Bounty program.
References
Configurations
History
07 Nov 2023, 04:06
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
27 Feb 2023, 15:24
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:* | |
References | (MISC) https://docs.github.com/en/enterprise-server@3.7/admin/release-notes#3.7.6 - Release Notes, Vendor Advisory | |
CWE | CWE-22 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
First Time |
Github
Github enterprise Server |
16 Feb 2023, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-02-16 21:15
Updated : 2023-12-10 14:48
NVD link : CVE-2023-22380
Mitre link : CVE-2023-22380
CVE.ORG link : CVE-2023-22380
JSON object : View
Products Affected
github
- enterprise_server
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')