CVE-2020-10517 – Improper access control in GitHub Enterprise Server leading to the enumeration of private repository names
https://notcve.org/view.php?id=CVE-2020-10517
An improper access control vulnerability was identified in GitHub Enterprise Server that allowed authenticated users of the instance to determine the names of unauthorized private repositories given their numerical IDs. This vulnerability did not allow unauthorized access to any repository content besides the name. This vulnerability affected all versions of GitHub Enterprise Server prior to 2.22 and was fixed in versions 2.21.6, 2.20.15, and 2.19.21. This vulnerability was reported via the GitHub Bug Bounty program. Se identificó una vulnerabilidad de control de acceso inapropiado en GitHub Enterprise Server que permitió a usuarios autenticados de la instancia determinar los nombres de los repositorios privados no autorizados dados sus ID numéricos. • https://enterprise.github.com/releases/2.19.21/notes https://enterprise.github.com/releases/2.20.15/notes https://enterprise.github.com/releases/2.21.6/notes • CWE-285: Improper Authorization •
CVE-2020-10518 – Unsafe configuration options in GitHub Pages leading to remote code execution on GitHub Enterprise Server
https://notcve.org/view.php?id=CVE-2020-10518
A remote code execution vulnerability was identified in GitHub Enterprise Server that could be exploited when building a GitHub Pages site. User-controlled configuration of the underlying parsers used by GitHub Pages were not sufficiently restricted and made it possible to execute commands on the GitHub Enterprise Server instance. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance. This vulnerability affected all versions of GitHub Enterprise Server prior to 2.22 and was fixed in 2.21.6, 2.20.15, and 2.19.21. The underlying issues contributing to this vulnerability were identified both internally and through the GitHub Security Bug Bounty program. • https://enterprise.github.com/releases/2.19.21/notes https://enterprise.github.com/releases/2.20.15/notes https://enterprise.github.com/releases/2.21.6/notes • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •
CVE-2020-5238 – Denial of service in table parsing in cmark-gfm
https://notcve.org/view.php?id=CVE-2020-5238
The table extension in GitHub Flavored Markdown before version 0.29.0.gfm.1 takes O(n * n) time to parse certain inputs. An attacker could craft a markdown table which would take an unreasonably long time to process, causing a denial of service. This issue does not affect the upstream cmark project. The issue has been fixed in version 0.29.0.gfm.1. La extensión de tabla en GitHub Flavored Markdown anterior a la versión 0.29.0.gfm.1 toma un tiempo O(n*n) en analizar determinadas entradas. • https://github.com/github/cmark-gfm/commit/85d895289c5ab67f988ca659493a64abb5fec7b4 https://github.com/github/cmark-gfm/security/advisories/GHSA-7gc6-9qr5-hc85 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TCDHBTUFIOYRIS5HAS6PZNBNMB7IOAX3 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WMQFOQQCWOAMQ4I2XIVCVOXXIJ75HDCW https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZGJH2A4VAV54X6NSCNNGSEIGIIY5N2VR https://access.redhat& • CWE-20: Improper Input Validation •
CVE-2020-10516 – Improper access control in GitHub Enterprise Server leading to privilege escalation of organization member
https://notcve.org/view.php?id=CVE-2020-10516
An improper access control vulnerability was identified in the GitHub Enterprise Server API that allowed an organization member to escalate permissions and gain access to unauthorized repositories within an organization. This vulnerability affected all versions of GitHub Enterprise Server prior to 2.21 and was fixed in 2.20.9, 2.19.15, and 2.18.20. This vulnerability was reported via the GitHub Bug Bounty program. Se identificó una vulnerabilidad de control de acceso inapropiado en la API de GitHub Enterprise Server, que permitió a un miembro de la organización escalar permisos y conseguir acceso a repositorios no autorizados dentro de una organización. Esta vulnerabilidad afectó a todas las versiones de GitHub Enterprise Server anteriores a 2.21 y fue corregida en las versiones 2.20.9, 2.19.15 y 2.18.20. • https://enterprise.github.com/releases/2.18.20/notes https://enterprise.github.com/releases/2.19.15/notes https://enterprise.github.com/releases/2.20.9/notes • CWE-285: Improper Authorization CWE-552: Files or Directories Accessible to External Parties •
CVE-2017-18365
https://notcve.org/view.php?id=CVE-2017-18365
The Management Console in GitHub Enterprise 2.8.x before 2.8.7 has a deserialization issue that allows unauthenticated remote attackers to execute arbitrary code. This occurs because the enterprise session secret is always the same, and can be found in the product's source code. By sending a crafted cookie signed with this secret, one can call Marshal.load with arbitrary data, which is a problem because the Marshal data format allows Ruby objects. La consola de gestión en GitHub Enterprise, en las versiones 2.8.x anteriores a la 2.8.7, tiene un fallo de deserialización que permite a los atacantes remotos sin autenticar ejecutar código arbitrario. Esto ocurre debido a que el secreto de sesión "enterprise" es siempre el mismo y puede encontrarse en el código fuente del producto. • https://enterprise.github.com/releases/2.8.7/notes https://www.exablue.de/blog/2017-03-15-github-enterprise-remote-code-execution.html • CWE-502: Deserialization of Untrusted Data •