An improper access control vulnerability was identified in the GitHub Enterprise Server API that allowed an organization member to escalate permissions and gain access to unauthorized repositories within an organization. This vulnerability affected all versions of GitHub Enterprise Server prior to 2.21 and was fixed in 2.20.9, 2.19.15, and 2.18.20. This vulnerability was reported via the GitHub Bug Bounty program.
References
Link | Resource |
---|---|
https://enterprise.github.com/releases/2.18.20/notes | Release Notes Third Party Advisory |
https://enterprise.github.com/releases/2.19.15/notes | Release Notes Third Party Advisory |
https://enterprise.github.com/releases/2.20.9/notes | Release Notes Third Party Advisory |
https://enterprise.github.com/releases/2.18.20/notes | Release Notes Third Party Advisory |
https://enterprise.github.com/releases/2.19.15/notes | Release Notes Third Party Advisory |
https://enterprise.github.com/releases/2.20.9/notes | Release Notes Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:55
Type | Values Removed | Values Added |
---|---|---|
References | () https://enterprise.github.com/releases/2.18.20/notes - Release Notes, Third Party Advisory | |
References | () https://enterprise.github.com/releases/2.19.15/notes - Release Notes, Third Party Advisory | |
References | () https://enterprise.github.com/releases/2.20.9/notes - Release Notes, Third Party Advisory |
Information
Published : 2020-06-03 14:15
Updated : 2024-11-21 04:55
NVD link : CVE-2020-10516
Mitre link : CVE-2020-10516
CVE.ORG link : CVE-2020-10516
JSON object : View
Products Affected
github
- github