Lucene search

K
cve[email protected]CVE-2023-51379
HistoryDec 21, 2023 - 9:15 p.m.

CVE-2023-51379

2023-12-2121:15:13
CWE-863
web.nvd.nist.gov
15
github
enterprise
server
authorization
vulnerability
cve-2023-51379
nvd

4.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N

0.001 Low

EPSS

Percentile

26.0%

An incorrect authorization vulnerability was identified in GitHub Enterprise Server that allowed issue comments to be updated with an improperly scoped token. This vulnerability did not allow unauthorized access to any repository content as it also required contents:write and issues:read permissions. This vulnerability affected all versions of GitHub Enterprise Server since 3.7 and was fixed in version 3.17.19, 3.8.12, 3.9.7, 3.10.4, and 3.11.1.

Affected configurations

Vulners
NVD
Node
githubenterprise_serverRange3.7.03.7.18
OR
githubenterprise_serverRange3.8.03.8.11
OR
githubenterprise_serverRange3.9.03.9.6
OR
githubenterprise_serverRange3.10.03.10.3
OR
githubenterprise_serverRange3.113.11.0
VendorProductVersionCPE
githubenterprise_server*cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
githubenterprise_server*cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
githubenterprise_server*cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
githubenterprise_server*cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
githubenterprise_server*cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "defaultStatus": "affected",
    "product": "Enterprise Server",
    "vendor": "GitHub",
    "versions": [
      {
        "changes": [
          {
            "at": "3.7.19",
            "status": "unaffected"
          }
        ],
        "lessThanOrEqual": "3.7.18",
        "status": "affected",
        "version": "3.7.0",
        "versionType": "semver"
      },
      {
        "changes": [
          {
            "at": "3.8.12",
            "status": "unaffected"
          }
        ],
        "lessThanOrEqual": "3.8.11",
        "status": "affected",
        "version": "3.8.0",
        "versionType": "semver"
      },
      {
        "changes": [
          {
            "at": "3.9.7",
            "status": "unaffected"
          }
        ],
        "lessThanOrEqual": "3.9.6",
        "status": "affected",
        "version": "3.9.0",
        "versionType": "semver"
      },
      {
        "changes": [
          {
            "at": "3.10.4",
            "status": "unaffected"
          }
        ],
        "lessThanOrEqual": "3.10.3",
        "status": "affected",
        "version": "3.10.0",
        "versionType": "semver"
      },
      {
        "changes": [
          {
            "at": "3.11.1",
            "status": "unaffected"
          }
        ],
        "lessThanOrEqual": "3.11.0",
        "status": "affected",
        "version": "3.11",
        "versionType": "semver"
      }
    ]
  }
]

4.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N

0.001 Low

EPSS

Percentile

26.0%

Related for CVE-2023-51379