CVE-2022-23737 – Improper Privilege Management in GitHub Enterprise Server leading to page creation and deletion
https://notcve.org/view.php?id=CVE-2022-23737
An improper privilege management vulnerability was identified in GitHub Enterprise Server that allowed users with improper privileges to create or delete pages via the API. To exploit this vulnerability, an attacker would need to be added to an organization's repo with write permissions. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.7 and was fixed in versions 3.2.20, 3.3.15, 3.4.10, 3.5.7, and 3.6.3. This vulnerability was reported via the GitHub Bug Bounty program. Se identificó una vulnerabilidad de administración de privilegios inadecuada en GitHub Enterprise Server que permitía a los usuarios con privilegios inadecuados crear o eliminar páginas a través de la API. • https://docs.github.com/en/enterprise-server%403.2/admin/release-notes#3.2.20 https://docs.github.com/en/enterprise-server%403.3/admin/release-notes#3.3.15 https://docs.github.com/en/enterprise-server%403.4/admin/release-notes#3.4.10 https://docs.github.com/en/enterprise-server%403.5/admin/release-notes#3.5.7 https://docs.github.com/en/enterprise-server%403.6/admin/release-notes#3.6.3 • CWE-269: Improper Privilege Management •
CVE-2022-23740 – Improper Neutralization of Argument Delimiters in a Command in GitHub Enterprise Server leading to Remote Code Execution
https://notcve.org/view.php?id=CVE-2022-23740
CRITICAL: An improper neutralization of argument delimiters in a command vulnerability was identified in GitHub Enterprise Server that enabled remote code execution. To exploit this vulnerability, an attacker would need permission to create and build GitHub Pages using GitHub Actions. This vulnerability affected only version 3.7.0 of GitHub Enterprise Server and was fixed in version 3.7.1. This vulnerability was reported via the GitHub Bug Bounty program. CRÍTICO: Se identificó una neutralización incorrecta de los delimitadores de argumentos en una vulnerabilidad de comando en GitHub Enterprise Server que permitía la ejecución remota de código. • https://docs.github.com/en/enterprise-server%403.7/admin/release-notes#3.7.1 • CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') •
CVE-2022-23738 – Incomplete cache verification issue in GitHub Enterprise Server leading to exposure of private repo files
https://notcve.org/view.php?id=CVE-2022-23738
An improper cache key vulnerability was identified in GitHub Enterprise Server that allowed an unauthorized actor to access private repository files through a public repository. To exploit this, an actor would need to already be authorized on the GitHub Enterprise Server instance, be able to create a public repository, and have a site administrator visit a specially crafted URL. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.6 and was fixed in versions 3.2.20, 3.3.15, 3.4.10, 3.5.7, 3.6.3. This vulnerability was reported via the GitHub Bug Bounty program. Se identificó una vulnerabilidad de clave de caché inadecuada en GitHub Enterprise Server que permitió a un actor no autorizado acceder a archivos del repositorio privado a través de un repositorio público. • https://docs.github.com/en/enterprise-server%403.2/admin/release-notes#3.2.20 https://docs.github.com/en/enterprise-server%403.3/admin/release-notes#3.3.15 https://docs.github.com/en/enterprise-server%403.4/admin/release-notes#3.4.10 https://docs.github.com/en/enterprise-server%403.5/admin/release-notes#3.5.7 https://docs.github.com/en/enterprise-server%403.6/admin/release-notes#3.6.3 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-552: Files or Directories Accessible to External Parties •
CVE-2022-23734 – Deserialization of Untrusted Data vulnerability in GitHub Enterprise Server leading to Remote Code Execution
https://notcve.org/view.php?id=CVE-2022-23734
A deserialization of untrusted data vulnerability was identified in GitHub Enterprise Server that could potentially lead to remote code execution on the SVNBridge. To exploit this vulnerability, an attacker would need to gain access via a server-side request forgery (SSRF) that would let an attacker control the data being deserialized. This vulnerability affected all versions of GitHub Enterprise Server prior to v3.6 and was fixed in versions 3.5.3, 3.4.6, 3.3.11, and 3.2.16. This vulnerability was reported via the GitHub Bug Bounty program. Se ha identificado una vulnerabilidad de deserialización de datos no fiables en GitHub Enterprise Server que podría conllevar la ejecución de código remota en el SVNBridge. • https://docs.github.com/en/enterprise-server%403.2/admin/release-notes#3.2.16 https://docs.github.com/en/enterprise-server%403.3/admin/release-notes#3.3.11 https://docs.github.com/en/enterprise-server%403.4/admin/release-notes#3.4.6 https://docs.github.com/en/enterprise-server%403.5/admin/release-notes#3.5.3 • CWE-502: Deserialization of Untrusted Data •
CVE-2022-23733 – Stored XSS vulnerability in GitHub Enterprise Server leading to injection of arbitrary attributes
https://notcve.org/view.php?id=CVE-2022-23733
A stored XSS vulnerability was identified in GitHub Enterprise Server that allowed the injection of arbitrary attributes. This injection was blocked by Github's Content Security Policy (CSP). This vulnerability affected all versions of GitHub Enterprise Server prior to 3.6 and was fixed in versions 3.3.11, 3.4.6 and 3.5.3. This vulnerability was reported via the GitHub Bug Bounty program. Se identificó una vulnerabilidad de tipo XSS almacenado en GitHub Enterprise Server que permitía la inyección de atributos arbitrarios. • https://docs.github.com/en/enterprise-server%403.3/admin/release-notes#3.3.11 https://docs.github.com/en/enterprise-server%403.4/admin/release-notes#3.4.6 https://docs.github.com/en/enterprise-server%403.5/admin/release-notes#3.5.3 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •