Lucene search

K
cve[email protected]CVE-2023-23762
HistoryApr 07, 2023 - 7:15 p.m.

CVE-2023-23762

2023-04-0719:15:07
CWE-697
web.nvd.nist.gov
13
github
enterprise server
commit smuggling
vulnerability
incorrect comparison
diff display
nvd
cve-2023-23762

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:N

0.002 Low

EPSS

Percentile

54.1%

An incorrect comparison vulnerability was identified in GitHub Enterprise Server that allowed commit smuggling by displaying an incorrect diff. To do so, an attacker would need write access to the repository and be able to correctly guess the target branch before it’s created by the code maintainer. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.9 and was fixed in versions 3.4.18, 3.5.15, 3.6.11, 3.7.8, and 3.8.1. This vulnerability was reported via the GitHub Bug Bounty program.

Affected configurations

Vulners
NVD
Node
githubenterprise_serverRange3.4.0–3.4.17
OR
githubenterprise_serverRange3.5.0–3.5.14
OR
githubenterprise_serverRange3.6.0–3.6.10
OR
githubenterprise_serverRange3.7.0–3.7.7
OR
githubenterprise_serverRange3.8.0–3.8.1
VendorProductVersionCPE
githubenterprise_server*cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
githubenterprise_server*cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
githubenterprise_server*cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
githubenterprise_server*cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
githubenterprise_server*cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "defaultStatus": "affected",
    "product": "Enterprise Server",
    "vendor": "GitHub",
    "versions": [
      {
        "changes": [
          {
            "at": "3.4.18",
            "status": "unaffected"
          }
        ],
        "lessThanOrEqual": "3.4.17",
        "status": "affected",
        "version": "3.4.0",
        "versionType": "semver"
      },
      {
        "changes": [
          {
            "at": "3.5.15",
            "status": "unaffected"
          }
        ],
        "lessThanOrEqual": "3.5.14",
        "status": "affected",
        "version": "3.5.0",
        "versionType": "semver"
      },
      {
        "changes": [
          {
            "at": "3.6.11",
            "status": "unaffected"
          }
        ],
        "lessThanOrEqual": "3.6.10",
        "status": "affected",
        "version": "3.6.0",
        "versionType": "semver"
      },
      {
        "changes": [
          {
            "at": "3.7.8",
            "status": "unaffected"
          }
        ],
        "lessThanOrEqual": "3.7.7",
        "status": "affected",
        "version": "3.7.0",
        "versionType": "semver"
      },
      {
        "changes": [
          {
            "at": "3.8.1",
            "status": "unaffected"
          }
        ],
        "lessThan": "3.8.1",
        "status": "affected",
        "version": "3.8.0",
        "versionType": "semver"
      },
      {
        "status": "unaffected",
        "version": "3.9.0"
      }
    ]
  }
]

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:N

0.002 Low

EPSS

Percentile

54.1%

Related for CVE-2023-23762