
CVE-2021-22867 – Unsafe configuration options in GitHub Pages leading to path traversal on GitHub Enterprise Server
https://notcve.org/view.php?id=CVE-2021-22867
14 Jul 2021 — A path traversal vulnerability was identified in GitHub Enterprise Server that could be exploited when building a GitHub Pages site. User-controlled configuration options used by GitHub Pages were not sufficiently restricted and made it possible to read files on the GitHub Enterprise Server instance. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance. This vulnerability affected all versions of GitHub Enterprise S... • https://docs.github.com/en/enterprise-server%402.22/admin/release-notes#2.22.17 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVE-2021-22866 – UI misrepresentation of granted permissions in GitHub Enterprise Server leading to unauthorized access to user resources
https://notcve.org/view.php?id=CVE-2021-22866
14 May 2021 — A UI misrepresentation vulnerability was identified in GitHub Enterprise Server that allowed more permissions to be granted during a GitHub App's user-authorization web flow than was displayed to the user during approval. To exploit this vulnerability, an attacker would need to create a GitHub App on the instance and have a user authorize the application through the web authentication flow. All permissions being granted would properly be shown during the first authorization, but in certain circumstances, if... • https://docs.github.com/en/enterprise-server%402.22/admin/release-notes#2.22.13 • CWE-451: User Interface (UI) Misrepresentation of Critical Information CWE-1021: Improper Restriction of Rendered UI Layers or Frames •

CVE-2021-22865 – Improper access control in GitHub Enterprise Server leading to unauthorized read access to private repository metadata
https://notcve.org/view.php?id=CVE-2021-22865
02 Apr 2021 — An improper access control vulnerability was identified in GitHub Enterprise Server that allowed access tokens generated from a GitHub App's web authentication flow to read private repository metadata via the REST API without having been granted the appropriate permissions. To exploit this vulnerability, an attacker would need to create a GitHub App on the instance and have a user authorize the application through the web authentication flow. The private repository metadata returned would be limited to repo... • https://docs.github.com/en/enterprise-server%402.21/admin/release-notes#2.21.18 • CWE-285: Improper Authorization •

CVE-2021-22864 – Unsafe configuration options in GitHub Pages leading to remote code execution on GitHub Enterprise Server
https://notcve.org/view.php?id=CVE-2021-22864
23 Mar 2021 — A remote code execution vulnerability was identified in GitHub Enterprise Server that could be exploited when building a GitHub Pages site. User-controlled configuration options used by GitHub Pages were not sufficiently restricted and made it possible to override environment variables leading to code execution on the GitHub Enterprise Server instance. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance. This vulne... • https://docs.github.com/en/enterprise-server%402.21/admin/release-notes#2.21.17 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •