Exploit Report

Computer Security And Bug Information

CVE-2023-23760

CVECVE-2023-23760
CVE Title
Published Date2023-03-08T19:15Z
Modified Date2023-03-14T20:58Z
CWE TypeCWE-22
CVSS 3.xCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
DescriptionA path traversal vulnerability was identified in GitHub Enterprise Server that allowed remote code execution when building a GitHub Pages site. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance. This vulnerability affected all versions of GitHub Enterprise Server prior to versions 3.8 and was fixed in versions 3.7.7, 3.6.10, 3.5.14, and 3.4.17. This vulnerability was reported via the GitHub Bug Bounty program.
References
By clicking these links you will leave this website. We do not endorse and will not be held accountable for any activity on external sites.
Reference URLhttps://docs.github.com/en/[email protected]/admin/release-notes#3.4.17
Reference DescriptionMISC https://docs.github.com/en/[email protected]/admin/release-notes#3.4.17
Reference URLhttps://docs.github.com/en/[email protected]/admin/release-notes#3.6.10
Reference DescriptionMISC https://docs.github.com/en/[email protected]/admin/release-notes#3.6.10
Reference URLhttps://docs.github.com/en/[email protected]/admin/release-notes#3.7.7
Reference DescriptionMISC https://docs.github.com/en/[email protected]/admin/release-notes#3.7.7
Reference URLhttps://docs.github.com/en/[email protected]/admin/release-notes#3.5.14
Reference DescriptionMISC https://docs.github.com/en/[email protected]/admin/release-notes#3.5.14
TagsRelease Notes
Sources NIST MITRE

This site's data is aggregated programmatically and provided "as is" without any representations or warranties, express or implied. Exploit.report is not affiliated with the The MITRE Corporation, U.S. Department of Homeland Security (DHS), Cybersecurity and Infrastructure Security Agency (CISA), or US government in any way. CVE and the CVE logo are registered trademarks of The MITRE Corporation

© 2022 Exploit.Report | Data | Contact | Privacy Policy | Articles