CVE-2023-46645

A path traversal vulnerability was identified in GitHub Enterprise Server that allowed arbitrary file reading when building a GitHub Pages site. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance. This vulnerability affected all versions of GitHub Enterprise Server since 3.7 and was fixed in version 3.7.19, 3.8.12, 3.9.7, 3.10.4, and 3.11.1. This vulnerability was reported via the GitHub Bug Bounty program.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*

History

29 Dec 2023, 16:27

Type Values Removed Values Added
References () https://docs.github.com/en/enterprise-server@3.10/admin/release-notes#3.10.4 - () https://docs.github.com/en/enterprise-server@3.10/admin/release-notes#3.10.4 - Release Notes
References () https://docs.github.com/en/enterprise-server@3.11/admin/release-notes#3.11.1 - () https://docs.github.com/en/enterprise-server@3.11/admin/release-notes#3.11.1 - Release Notes
References () https://docs.github.com/en/enterprise-server@3.7/admin/release-notes#3.7.19 - () https://docs.github.com/en/enterprise-server@3.7/admin/release-notes#3.7.19 - Release Notes
References () https://docs.github.com/en/enterprise-server@3.8/admin/release-notes#3.8.12 - () https://docs.github.com/en/enterprise-server@3.8/admin/release-notes#3.8.12 - Release Notes
References () https://docs.github.com/en/enterprise-server@3.9/admin/release-notes#3.9.7 - () https://docs.github.com/en/enterprise-server@3.9/admin/release-notes#3.9.7 - Release Notes
First Time Github enterprise Server
Github
CVSS v2 : unknown
v3 : 6.8
v2 : unknown
v3 : 4.9
CPE cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*

22 Dec 2023, 12:18

Type Values Removed Values Added
Summary
  • (es) Se identificó una vulnerabilidad de path traversal en GitHub Enterprise Server que permitía la lectura arbitraria de archivos al crear un sitio de GitHub Pages. Para explotar esta vulnerabilidad, un atacante necesitaría permiso para crear y construir un sitio de GitHub Pages en la instancia de GitHub Enterprise Server. Esta vulnerabilidad afectó a todas las versiones de GitHub Enterprise Server desde la 3.7 y se solucionó en las versiones 3.7.19, 3.8.12, 3.9.7, 3.10.4 y 3.11.1. Esta vulnerabilidad se informó a través del programa GitHub Bug Bounty.

21 Dec 2023, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-21 21:15

Updated : 2023-12-29 16:27


NVD link : CVE-2023-46645

Mitre link : CVE-2023-46645

CVE.ORG link : CVE-2023-46645


JSON object : View

Products Affected

github

  • enterprise_server
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')