CVE-2023-22380

A path traversal vulnerability was identified in GitHub Enterprise Server that allowed arbitrary file reading when building a GitHub Pages site. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance. This vulnerability affected all versions of GitHub Enterprise Server since 3.7 and was fixed in version 3.7.6. This vulnerability was reported via the GitHub Bug Bounty program.
Configurations

Configuration 1 (hide)

cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:44

Type Values Removed Values Added
References () https://docs.github.com/en/enterprise-server%403.7/admin/release-notes#3.7.6 - () https://docs.github.com/en/enterprise-server%403.7/admin/release-notes#3.7.6 -

07 Nov 2023, 04:06

Type Values Removed Values Added
References
  • {'url': 'https://docs.github.com/en/enterprise-server@3.7/admin/release-notes#3.7.6', 'name': 'https://docs.github.com/en/enterprise-server@3.7/admin/release-notes#3.7.6', 'tags': ['Release Notes', 'Vendor Advisory'], 'refsource': 'MISC'}
  • () https://docs.github.com/en/enterprise-server%403.7/admin/release-notes#3.7.6 -

Information

Published : 2023-02-16 21:15

Updated : 2024-11-21 07:44


NVD link : CVE-2023-22380

Mitre link : CVE-2023-22380

CVE.ORG link : CVE-2023-22380


JSON object : View

Products Affected

github

  • enterprise_server
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')