CVE-2023-22381

A code injection vulnerability was identified in GitHub Enterprise Server that allowed setting arbitrary environment variables from a single environment variable value in GitHub Actions when using a Windows based runner. To exploit this vulnerability, an attacker would need existing permission to control the value of environment variables for use with GitHub Actions. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.8.0 and was fixed in versions 3.4.15, 3.5.12, 3.6.8, 3.7.5. This vulnerability was reported via the GitHub Bug Bounty program.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*

History

07 Nov 2023, 04:06

Type Values Removed Values Added
Summary A code injection vulnerability was identified in GitHub Enterprise Server that allowed setting arbitrary environment variables from a single environment variable value in GitHub Actions when using a Windows based runner. To exploit this vulnerability, an attacker would need existing permission to control the value of environment variables for use with GitHub Actions. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.8.0 and was fixed in versions 3.4.15, 3.5.12, 3.6.8, 3.7.5. This vulnerability was reported via the GitHub Bug Bounty program. A code injection vulnerability was identified in GitHub Enterprise Server that allowed setting arbitrary environment variables from a single environment variable value in GitHub Actions when using a Windows based runner. To exploit this vulnerability, an attacker would need existing permission to control the value of environment variables for use with GitHub Actions. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.8.0 and was fixed in versions 3.4.15, 3.5.12, 3.6.8, 3.7.5. This vulnerability was reported via the GitHub Bug Bounty program.

10 Mar 2023, 20:54

Type Values Removed Values Added
References (MISC) https://docs.github.com/en/enterprise-server@3.8/admin/release-notes - (MISC) https://docs.github.com/en/enterprise-server@3.8/admin/release-notes - Release Notes
References (MISC) https://docs.github.com/en/enterprise-server@3.5/admin/release-notes#3.5.12 - (MISC) https://docs.github.com/en/enterprise-server@3.5/admin/release-notes#3.5.12 - Release Notes
References (MISC) https://docs.github.com/en/enterprise-server@3.4/admin/release-notes#3.4.15 - (MISC) https://docs.github.com/en/enterprise-server@3.4/admin/release-notes#3.4.15 - Release Notes
References (MISC) https://docs.github.com/en/enterprise-server@3.7/admin/release-notes#3.7.5 - (MISC) https://docs.github.com/en/enterprise-server@3.7/admin/release-notes#3.7.5 - Release Notes
References (MISC) https://docs.github.com/en/enterprise-server@3.6/admin/release-notes#3.6.8 - (MISC) https://docs.github.com/en/enterprise-server@3.6/admin/release-notes#3.6.8 - Release Notes
CPE cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
First Time Github
Github enterprise Server
CWE CWE-94
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8

02 Mar 2023, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-03-02 21:15

Updated : 2023-12-10 14:48


NVD link : CVE-2023-22381

Mitre link : CVE-2023-22381

CVE.ORG link : CVE-2023-22381


JSON object : View

Products Affected

github

  • enterprise_server
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')