An improper authentication vulnerability was identified in GitHub Enterprise Server that allowed an unauthorized actor to modify other users' secret gists by authenticating through an SSH certificate authority. To do so, a user had to know the secret gist's URL. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.9 and was fixed in versions 3.4.18, 3.5.15, 3.6.11, 3.7.8, and 3.8.1. This vulnerability was reported via the GitHub Bug Bounty program.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:46
Type | Values Removed | Values Added |
---|---|---|
References | () https://docs.github.com/en/enterprise-server@3.4/admin/release-notes#3.4.18 - Release Notes | |
References | () https://docs.github.com/en/enterprise-server@3.5/admin/release-notes#3.5.15 - Release Notes | |
References | () https://docs.github.com/en/enterprise-server@3.6/admin/release-notes#3.6.11 - Release Notes | |
References | () https://docs.github.com/en/enterprise-server@3.7/admin/release-notes#3.7.8 - Release Notes | |
References | () https://docs.github.com/en/enterprise-server@3.8/admin/release-notes#3.8.1 - Release Notes | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.7 |
Information
Published : 2023-04-07 19:15
Updated : 2024-11-21 07:46
NVD link : CVE-2023-23761
Mitre link : CVE-2023-23761
CVE.ORG link : CVE-2023-23761
JSON object : View
Products Affected
github
- enterprise_server
CWE
CWE-287
Improper Authentication