CVE-2023-22381

A code injection vulnerability was identified in GitHub Enterprise Server that allowed setting arbitrary environment variables from a single environment variable value in GitHub Actions when using a Windows based runner. To exploit this vulnerability, an attacker would need existing permission to control the value of environment variables for use with GitHub Actions. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.8.0 and was fixed in versions 3.4.15, 3.5.12, 3.6.8, 3.7.5. This vulnerability was reported via the GitHub Bug Bounty program.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:44

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 8.8
v2 : unknown
v3 : 4.1
References () https://docs.github.com/en/enterprise-server@3.4/admin/release-notes#3.4.15 - Release Notes () https://docs.github.com/en/enterprise-server@3.4/admin/release-notes#3.4.15 - Release Notes
References () https://docs.github.com/en/enterprise-server@3.5/admin/release-notes#3.5.12 - Release Notes () https://docs.github.com/en/enterprise-server@3.5/admin/release-notes#3.5.12 - Release Notes
References () https://docs.github.com/en/enterprise-server@3.6/admin/release-notes#3.6.8 - Release Notes () https://docs.github.com/en/enterprise-server@3.6/admin/release-notes#3.6.8 - Release Notes
References () https://docs.github.com/en/enterprise-server@3.7/admin/release-notes#3.7.5 - Release Notes () https://docs.github.com/en/enterprise-server@3.7/admin/release-notes#3.7.5 - Release Notes
References () https://docs.github.com/en/enterprise-server@3.8/admin/release-notes - Release Notes () https://docs.github.com/en/enterprise-server@3.8/admin/release-notes - Release Notes

07 Nov 2023, 04:06

Type Values Removed Values Added
Summary A code injection vulnerability was identified in GitHub Enterprise Server that allowed setting arbitrary environment variables from a single environment variable value in GitHub Actions when using a Windows based runner. To exploit this vulnerability, an attacker would need existing permission to control the value of environment variables for use with GitHub Actions. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.8.0 and was fixed in versions 3.4.15, 3.5.12, 3.6.8, 3.7.5. This vulnerability was reported via the GitHub Bug Bounty program. A code injection vulnerability was identified in GitHub Enterprise Server that allowed setting arbitrary environment variables from a single environment variable value in GitHub Actions when using a Windows based runner. To exploit this vulnerability, an attacker would need existing permission to control the value of environment variables for use with GitHub Actions. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.8.0 and was fixed in versions 3.4.15, 3.5.12, 3.6.8, 3.7.5. This vulnerability was reported via the GitHub Bug Bounty program.

Information

Published : 2023-03-02 21:15

Updated : 2024-11-21 07:44


NVD link : CVE-2023-22381

Mitre link : CVE-2023-22381

CVE.ORG link : CVE-2023-22381


JSON object : View

Products Affected

github

  • enterprise_server
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')