CVE | CVE-2023-23760 |
CVE Title | |
Published Date | 2023-03-08T19:15Z |
Modified Date | 2023-03-14T20:58Z |
CWE Type | CWE-22 |
CVSS 3.x | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Description | A path traversal vulnerability was identified in GitHub Enterprise Server that allowed remote code execution when building a GitHub Pages site. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance. This vulnerability affected all versions of GitHub Enterprise Server prior to versions 3.8 and was fixed in versions 3.7.7, 3.6.10, 3.5.14, and 3.4.17. This vulnerability was reported via the GitHub Bug Bounty program. |
References | |
By clicking these links you will leave this website. We do not endorse and will not be held accountable for any activity on external sites. | |
Reference URL | https://docs.github.com/en/[email protected]/admin/release-notes#3.4.17 |
Reference Description | MISC https://docs.github.com/en/[email protected]/admin/release-notes#3.4.17 |
Reference URL | https://docs.github.com/en/[email protected]/admin/release-notes#3.6.10 |
Reference Description | MISC https://docs.github.com/en/[email protected]/admin/release-notes#3.6.10 |
Reference URL | https://docs.github.com/en/[email protected]/admin/release-notes#3.7.7 |
Reference Description | MISC https://docs.github.com/en/[email protected]/admin/release-notes#3.7.7 |
Reference URL | https://docs.github.com/en/[email protected]/admin/release-notes#3.5.14 |
Reference Description | MISC https://docs.github.com/en/[email protected]/admin/release-notes#3.5.14 |
Tags | Release Notes |
Sources | NIST MITRE |