
CVE-2023-23761 – Improper authentication vulnerability in GitHub Enterprise Server leading to modification of secret gists
https://notcve.org/view.php?id=CVE-2023-23761
07 Apr 2023 — An improper authentication vulnerability was identified in GitHub Enterprise Server that allowed an unauthorized actor to modify other users' secret gists by authenticating through an SSH certificate authority. To do so, a user had to know the secret gist's URL. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.9 and was fixed in versions 3.4.18, 3.5.15, 3.6.11, 3.7.8, and 3.8.1. This vulnerability was reported via the GitHub Bug Bounty program. • https://docs.github.com/en/enterprise-server@3.4/admin/release-notes#3.4.18 • CWE-287: Improper Authentication •

CVE-2023-24824 – Quadratic complexity may lead to a denial of service in cmark-gfm
https://notcve.org/view.php?id=CVE-2023-24824
31 Mar 2023 — cmark-gfm is GitHub's fork of cmark, a CommonMark parsing and rendering library and program in C. A polynomial time complexity issue in cmark-gfm may lead to unbounded resource exhaustion and subsequent denial of service. This CVE covers quadratic complexity issues when parsing text which leads with either large numbers of `>` or `-` characters. This issue has been addressed in version 0.29.0.gfm.10. Users are advised to upgrade. • https://github.com/github/cmark-gfm/commit/2300c1bd2c8226108885bf019655c4159cf26b59 • CWE-400: Uncontrolled Resource Consumption CWE-407: Inefficient Algorithmic Complexity •

CVE-2023-26485 – Quadratic complexity may lead to a denial of service in cmark-gfm
https://notcve.org/view.php?id=CVE-2023-26485
31 Mar 2023 — cmark-gfm is GitHub's fork of cmark, a CommonMark parsing and rendering library and program in C. A polynomial time complexity issue in cmark-gfm may lead to unbounded resource exhaustion and subsequent denial of service. This CVE covers quadratic complexity issues when parsing text which leads with either large numbers of `_` characters. This issue has been addressed in version 0.29.0.gfm.10. Users are advised to upgrade. • https://github.com/github/cmark-gfm/commit/07a66c9bc341f902878e37d7da8647d6ef150987 • CWE-400: Uncontrolled Resource Consumption CWE-407: Inefficient Algorithmic Complexity •

CVE-2023-27581 – github-slug-action vulnerable to arbitrary code execution
https://notcve.org/view.php?id=CVE-2023-27581
13 Mar 2023 — github-slug-action is a GitHub Action to expose slug value of GitHub environment variables inside of one's GitHub workflow. Starting in version 4.0.0` and prior to version 4.4.1, this action uses the `github.head_ref` parameter in an insecure way. This vulnerability can be triggered by any user on GitHub on any workflow using the action on pull requests. They just need to create a pull request with a branch name, which can contain the attack payload. This can be used to execute code on the GitHub runners an... • https://github.com/rlespinasse/github-slug-action/commit/102b1a064a9b145e56556e22b18b19c624538d94 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVE-2023-23760 – Path traversal in GitHub Enterprise Server leading to remote code execution
https://notcve.org/view.php?id=CVE-2023-23760
08 Mar 2023 — A path traversal vulnerability was identified in GitHub Enterprise Server that allowed remote code execution when building a GitHub Pages site. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance. This vulnerability affected all versions of GitHub Enterprise Server prior to versions 3.8 and was fixed in versions 3.7.7, 3.6.10, 3.5.14, and 3.4.17. This vulnerability was reported via the GitHub Bug Bounty program. • https://docs.github.com/en/enterprise-server@3.4/admin/release-notes#3.4.17 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2022-46257 – Information disclosure in GitHub Enterprise Server leading to unauthorized viewing of private repository names
https://notcve.org/view.php?id=CVE-2022-46257
07 Mar 2023 — An information disclosure vulnerability was identified in GitHub Enterprise Server that allowed private repositories to be added to a GitHub Actions runner group via the API by a user who did not have access to those repositories, resulting in the repository names being shown in the UI. To exploit this vulnerability, an attacker would need access to the GHES instance, permissions to modify GitHub Actions runner groups, and successfully guess the obfuscated ID of private repositories. This vulnerability affe... • https://docs.github.com/en/enterprise-server%403.3/admin/release-notes#3.3.17 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-668: Exposure of Resource to Wrong Sphere •

CVE-2023-22381 – Code injection in GitHub Enterprise Server leading to arbitrary environment variables in GitHub Actions
https://notcve.org/view.php?id=CVE-2023-22381
02 Mar 2023 — A code injection vulnerability was identified in GitHub Enterprise Server that allowed setting arbitrary environment variables from a single environment variable value in GitHub Actions when using a Windows based runner. To exploit this vulnerability, an attacker would need existing permission to control the value of environment variables for use with GitHub Actions. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.8.0 and was fixed in versions 3.4.15, 3.5.12, 3.6.8, 3.7.5. Th... • https://docs.github.com/en/enterprise-server@3.4/admin/release-notes#3.4.15 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2023-22380 – Path traversal in GitHub Enterprise Server leading to arbitrary file reading when building a GitHub Pages site
https://notcve.org/view.php?id=CVE-2023-22380
16 Feb 2023 — A path traversal vulnerability was identified in GitHub Enterprise Server that allowed arbitrary file reading when building a GitHub Pages site. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance. This vulnerability affected all versions of GitHub Enterprise Server since 3.7 and was fixed in version 3.7.6. This vulnerability was reported via the GitHub Bug Bounty program. • https://docs.github.com/en/enterprise-server%403.7/admin/release-notes#3.7.6 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2023-22486 – cmark-gfm Quadratic complexity bug in handle_close_bracket may lead to a denial of service
https://notcve.org/view.php?id=CVE-2023-22486
24 Jan 2023 — cmark-gfm is GitHub's fork of cmark, a CommonMark parsing and rendering library and program in C. Versions prior to 0.29.0.gfm.7 contain a polynomial time complexity issue in handle_close_bracket that may lead to unbounded resource exhaustion and subsequent denial of service. This vulnerability has been patched in 0.29.0.gfm.7. cmark-gfm es la bifurcación de GitHub de cmark, una librería y programa de análisis y representación de CommonMark en C. Las versiones anteriores a 0.29.0.gfm.7 contienen un problema... • https://github.com/github/cmark-gfm/security/advisories/GHSA-r572-jvj2-3m8p • CWE-400: Uncontrolled Resource Consumption CWE-407: Inefficient Algorithmic Complexity •

CVE-2023-22485 – cmark-gfm out-of-bounds read in validate_protocol
https://notcve.org/view.php?id=CVE-2023-22485
24 Jan 2023 — cmark-gfm is GitHub's fork of cmark, a CommonMark parsing and rendering library and program in C. In versions prior 0.29.0.gfm.7, a crafted markdown document can trigger an out-of-bounds read in the `validate_protocol` function. We believe this bug is harmless in practice, because the out-of-bounds read accesses `malloc` metadata without causing any visible damage.This vulnerability has been patched in 0.29.0.gfm.7. cmmark-gfm es la bifurcación de GitHub de cmark, una librería y programa de análisis y repre... • https://github.com/github/cmark-gfm/security/advisories/GHSA-c944-cv5f-hpvr • CWE-91: XML Injection (aka Blind XPath Injection) CWE-125: Out-of-bounds Read •