7 results (0.007 seconds)

CVSS: 8.1EPSS: 0%CPEs: 4EXPL: 0

03 Mar 2021 — An improper access control vulnerability was identified in the GitHub Enterprise Server GraphQL API that allowed authenticated users of the instance to modify the maintainer collaboration permission of a pull request without proper authorization. By exploiting this vulnerability, an attacker would be able to gain access to head branches of pull requests opened on repositories of which they are a maintainer. Forking is disabled by default for organization owned private repositories and would prevent this vul... • https://docs.github.com/en/enterprise-server%402.20/admin/release-notes#2.20.24 • CWE-285: Improper Authorization •

CVSS: 8.8EPSS: 1%CPEs: 3EXPL: 0

03 Mar 2021 — A remote code execution vulnerability was identified in GitHub Enterprise Server that could be exploited when building a GitHub Pages site. User-controlled configuration of the underlying parsers used by GitHub Pages were not sufficiently restricted and made it possible to execute commands on the GitHub Enterprise Server instance. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance. This vulnerability affected all ... • https://docs.github.com/en/enterprise-server%402.20/admin/release-notes#2.20.24 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 6.5EPSS: 0%CPEs: 4EXPL: 0

03 Mar 2021 — An improper access control vulnerability was identified in GitHub Enterprise Server that allowed authenticated users of the instance to gain write access to unauthorized repositories via specifically crafted pull requests and REST API requests. An attacker would need to be able to fork the targeted repository, a setting that is disabled by default for organization owned private repositories. Branch protections such as required pull request reviews or status checks would prevent unauthorized commits from bei... • https://docs.github.com/en/enterprise-server%402.20/admin/release-notes#2.20.24 • CWE-285: Improper Authorization •

CVSS: 4.3EPSS: 0%CPEs: 3EXPL: 0

27 Aug 2020 — An improper access control vulnerability was identified in GitHub Enterprise Server that allowed authenticated users of the instance to determine the names of unauthorized private repositories given their numerical IDs. This vulnerability did not allow unauthorized access to any repository content besides the name. This vulnerability affected all versions of GitHub Enterprise Server prior to 2.22 and was fixed in versions 2.21.6, 2.20.15, and 2.19.21. This vulnerability was reported via the GitHub Bug Bount... • https://enterprise.github.com/releases/2.19.21/notes • CWE-285: Improper Authorization •

CVSS: 8.8EPSS: 3%CPEs: 3EXPL: 0

27 Aug 2020 — A remote code execution vulnerability was identified in GitHub Enterprise Server that could be exploited when building a GitHub Pages site. User-controlled configuration of the underlying parsers used by GitHub Pages were not sufficiently restricted and made it possible to execute commands on the GitHub Enterprise Server instance. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance. This vulnerability affected all ... • https://enterprise.github.com/releases/2.19.21/notes • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 9.8EPSS: 0%CPEs: 3EXPL: 0

03 Jun 2020 — An improper access control vulnerability was identified in the GitHub Enterprise Server API that allowed an organization member to escalate permissions and gain access to unauthorized repositories within an organization. This vulnerability affected all versions of GitHub Enterprise Server prior to 2.21 and was fixed in 2.20.9, 2.19.15, and 2.18.20. This vulnerability was reported via the GitHub Bug Bounty program. Se identificó una vulnerabilidad de control de acceso inapropiado en la API de GitHub Enterpri... • https://enterprise.github.com/releases/2.18.20/notes • CWE-285: Improper Authorization CWE-552: Files or Directories Accessible to External Parties •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

04 Apr 2012 — GitHub Enterprise before 20120304 does not properly restrict the use of a hash to provide values for a model's attributes, which allows remote attackers to set the public_key[user_id] value via a modified URL for the public-key update form, related to a "mass assignment" vulnerability. GitHub Enterprise antes de v20120304 no restringe debidamente el uso de un hash para proporcionar los valores para un modelo de atributos, lo que permite a atacantes remotos establecer el valor public_key [user_id] a través d... • http://homakov.blogspot.com/2012/03/how-to.html • CWE-913: Improper Control of Dynamically-Managed Code Resources •