Page 17 of 118 results (0.007 seconds)

CVSS: 6.5EPSS: 0%CPEs: 5EXPL: 0

An improper privilege management vulnerability was identified in GitHub Enterprise Server that allowed users with improper privileges to create or delete pages via the API. To exploit this vulnerability, an attacker would need to be added to an organization's repo with write permissions. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.7 and was fixed in versions 3.2.20, 3.3.15, 3.4.10, 3.5.7, and 3.6.3. This vulnerability was reported via the GitHub Bug Bounty program. Se identificó una vulnerabilidad de administración de privilegios inadecuada en GitHub Enterprise Server que permitía a los usuarios con privilegios inadecuados crear o eliminar páginas a través de la API. • https://docs.github.com/en/enterprise-server%403.2/admin/release-notes#3.2.20 https://docs.github.com/en/enterprise-server%403.3/admin/release-notes#3.3.15 https://docs.github.com/en/enterprise-server%403.4/admin/release-notes#3.4.10 https://docs.github.com/en/enterprise-server%403.5/admin/release-notes#3.5.7 https://docs.github.com/en/enterprise-server%403.6/admin/release-notes#3.6.3 • CWE-269: Improper Privilege Management •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

CRITICAL: An improper neutralization of argument delimiters in a command vulnerability was identified in GitHub Enterprise Server that enabled remote code execution. To exploit this vulnerability, an attacker would need permission to create and build GitHub Pages using GitHub Actions. This vulnerability affected only version 3.7.0 of GitHub Enterprise Server and was fixed in version 3.7.1. This vulnerability was reported via the GitHub Bug Bounty program. CRÍTICO: Se identificó una neutralización incorrecta de los delimitadores de argumentos en una vulnerabilidad de comando en GitHub Enterprise Server que permitía la ejecución remota de código. • https://docs.github.com/en/enterprise-server%403.7/admin/release-notes#3.7.1 • CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') •

CVSS: 5.7EPSS: 0%CPEs: 5EXPL: 0

An improper cache key vulnerability was identified in GitHub Enterprise Server that allowed an unauthorized actor to access private repository files through a public repository. To exploit this, an actor would need to already be authorized on the GitHub Enterprise Server instance, be able to create a public repository, and have a site administrator visit a specially crafted URL. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.6 and was fixed in versions 3.2.20, 3.3.15, 3.4.10, 3.5.7, 3.6.3. This vulnerability was reported via the GitHub Bug Bounty program. Se identificó una vulnerabilidad de clave de caché inadecuada en GitHub Enterprise Server que permitió a un actor no autorizado acceder a archivos del repositorio privado a través de un repositorio público. • https://docs.github.com/en/enterprise-server%403.2/admin/release-notes#3.2.20 https://docs.github.com/en/enterprise-server%403.3/admin/release-notes#3.3.15 https://docs.github.com/en/enterprise-server%403.4/admin/release-notes#3.4.10 https://docs.github.com/en/enterprise-server%403.5/admin/release-notes#3.5.7 https://docs.github.com/en/enterprise-server%403.6/admin/release-notes#3.6.3 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-552: Files or Directories Accessible to External Parties •

CVSS: 9.9EPSS: 0%CPEs: 5EXPL: 0

GitHub Actions Runner is the application that runs a job from a GitHub Actions workflow. The actions runner invokes the docker cli directly in order to run job containers, service containers, or container actions. A bug in the logic for how the environment is encoded into these docker commands was discovered in versions prior to 2.296.2, 2.293.1, 2.289.4, 2.285.2, and 2.283.4 that allows an input to escape the environment variable and modify that docker command invocation directly. Jobs that use container actions, job containers, or service containers alongside untrusted user inputs in environment variables may be vulnerable. The Actions Runner has been patched, both on `github.com` and hotfixes for GHES and GHAE customers in versions 2.296.2, 2.293.1, 2.289.4, 2.285.2, and 2.283.4. • https://github.com/actions/runner/pull/2107 https://github.com/actions/runner/pull/2108 https://github.com/actions/runner/security/advisories/GHSA-2c6m-6gqh-6qg3 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 8.8EPSS: 1%CPEs: 4EXPL: 0

A deserialization of untrusted data vulnerability was identified in GitHub Enterprise Server that could potentially lead to remote code execution on the SVNBridge. To exploit this vulnerability, an attacker would need to gain access via a server-side request forgery (SSRF) that would let an attacker control the data being deserialized. This vulnerability affected all versions of GitHub Enterprise Server prior to v3.6 and was fixed in versions 3.5.3, 3.4.6, 3.3.11, and 3.2.16. This vulnerability was reported via the GitHub Bug Bounty program. Se ha identificado una vulnerabilidad de deserialización de datos no fiables en GitHub Enterprise Server que podría conllevar la ejecución de código remota en el SVNBridge. • https://docs.github.com/en/enterprise-server%403.2/admin/release-notes#3.2.16 https://docs.github.com/en/enterprise-server%403.3/admin/release-notes#3.3.11 https://docs.github.com/en/enterprise-server%403.4/admin/release-notes#3.4.6 https://docs.github.com/en/enterprise-server%403.5/admin/release-notes#3.5.3 • CWE-502: Deserialization of Untrusted Data •