Lucene search

K
GithubEnterprise Server

24 matches found

CVE
CVE
added 2024/02/13 7:15 p.m.76 views

CVE-2024-1082

A path traversal vulnerability was identified in GitHub Enterprise Server that allowed an attacker to gain unauthorized read permission to files by deploying arbitrary symbolic links to a GitHub Pages site with a specially crafted artifact tarball. To exploit this vulnerability, an attacker would n...

6.5CVSS6.3AI score0.00461EPSS
CVE
CVE
added 2021/07/14 9:15 p.m.57 views

CVE-2021-22867

A path traversal vulnerability was identified in GitHub Enterprise Server that could be exploited when building a GitHub Pages site. User-controlled configuration options used by GitHub Pages were not sufficiently restricted and made it possible to read files on the GitHub Enterprise Server instanc...

6.5CVSS5.1AI score0.00457EPSS
CVE
CVE
added 2024/07/16 10:15 p.m.53 views

CVE-2024-5815

A Cross-Site Request Forgery vulnerability in GitHub Enterprise Server allowed write operations on a victim-owned repository by exploiting incorrect request types. A mitigating factor is that the attacker would have to be a trusted GitHub Enterprise Server user, and the victim would have to visit a...

6.8CVSS6.5AI score0.00059EPSS
CVE
CVE
added 2022/12/01 9:15 p.m.52 views

CVE-2022-23737

An improper privilege management vulnerability was identified in GitHub Enterprise Server that allowed users with improper privileges to create or delete pages via the API. To exploit this vulnerability, an attacker would need to be added to an organization's repo with write permissions. This vulne...

6.5CVSS6.4AI score0.0004EPSS
CVE
CVE
added 2023/01/09 5:15 p.m.51 views

CVE-2022-46258

An incorrect authorization vulnerability was identified in GitHub Enterprise Server that allowed a repository-scoped token with read/write access to modify Action Workflow files without a Workflow scope. The Create or Update file contents API should enforce workflow scope. This vulnerability affect...

6.5CVSS6.2AI score0.00052EPSS
CVE
CVE
added 2023/02/16 9:15 p.m.50 views

CVE-2023-22380

A path traversal vulnerability was identified in GitHub Enterprise Server that allowed arbitrary file reading when building a GitHub Pages site. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance. This vu...

6.5CVSS6.3AI score0.00098EPSS
CVE
CVE
added 2021/04/02 6:15 p.m.48 views

CVE-2021-22865

An improper access control vulnerability was identified in GitHub Enterprise Server that allowed access tokens generated from a GitHub App's web authentication flow to read private repository metadata via the REST API without having been granted the appropriate permissions. To exploit this vulnerab...

6.5CVSS6.5AI score0.00226EPSS
CVE
CVE
added 2024/09/23 9:15 p.m.47 views

CVE-2024-8263

An improper privilege management vulnerability allowed arbitrary workflows to be committed using an improperly scoped PAT through the use of nested tags. This vulnerability affected all versions of GitHub Enterprise Server and was fixed in version 3.10.17, 3.11.15, 3.12.9, 3.13.4, and 3.14.1. This ...

6.2CVSS7.1AI score0.00137EPSS
CVE
CVE
added 2024/02/13 7:15 p.m.46 views

CVE-2024-1084

Cross-site Scripting in the tag name pattern field in the tag protections UI in GitHub Enterprise Server allows a malicious website that requires user interaction and social engineering to make changes to a user account via CSP bypass with created CSRF tokens. This vulnerability affected all versio...

6.5CVSS6.3AI score0.00096EPSS
CVE
CVE
added 2024/07/16 10:15 p.m.44 views

CVE-2024-6395

An exposure of sensitive information vulnerability in GitHub Enterprise Server would allow an attacker to enumerate the names of private repositories that utilize deploy keys. This vulnerability did not allow unauthorized access to any repository content besides the name. This vulnerability affecte...

6.3CVSS5.1AI score0.00147EPSS
CVE
CVE
added 2021/11/10 2:15 a.m.43 views

CVE-2021-22870

A path traversal vulnerability was identified in GitHub Pages builds on GitHub Enterprise Server that could allow an attacker to read system files. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance. This...

6.5CVSS6.3AI score0.00457EPSS
CVE
CVE
added 2024/11/07 10:15 p.m.43 views

CVE-2024-10824

An authorization bypass vulnerability was identified in GitHub Enterprise Server that allowed unauthorized internal users to access sensitive secret scanning alert data intended only for business owners. This issue could be exploited only by organization members with a personal access token (PAT) a...

6CVSS6.3AI score0.00089EPSS
CVE
CVE
added 2024/08/20 8:15 p.m.43 views

CVE-2024-6337

An Incorrect Authorization vulnerability was identified in GitHub Enterprise Server that allowed a GitHub App with only content: read and pull_request_write: write permissions to read issue content inside a private repository. This was only exploitable via user access token and installation access ...

6.5CVSS6.2AI score0.00088EPSS
CVE
CVE
added 2024/07/16 10:15 p.m.42 views

CVE-2024-5566

An improper privilege management vulnerability allowed users to migrate private repositories without having appropriate scopes defined on the related Personal Access Token. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.14 and was fixed in version 3.13.1, 3.12.6, 3....

6.5CVSS5.8AI score0.00103EPSS
CVE
CVE
added 2024/07/16 10:15 p.m.42 views

CVE-2024-5816

An Incorrect Authorization vulnerability was identified in GitHub Enterprise Server that allowed a suspended GitHub App to retain access to the repository via a scoped user access token. This was only exploitable in public repositories while private repositories were not impacted. This vulnerabilit...

6.9CVSS5.1AI score0.00179EPSS
CVE
CVE
added 2024/07/16 10:15 p.m.42 views

CVE-2024-6336

A Security Misconfiguration vulnerability in GitHub Enterprise Server allowed sensitive information disclosure to unauthorized users in GitHub Enterprise Server by exploiting organization ruleset feature. This attack required an organization member to explicitly change the visibility of a dependent...

6.9CVSS5.1AI score0.00176EPSS
CVE
CVE
added 2024/09/23 9:15 p.m.41 views

CVE-2024-8770

A Cross-Site Scripting (XSS) vulnerability was identified in the repository transfer feature of GitHub Enterprise Server, which allows attackers to steal sensitive user information via social engineering. This vulnerability affected all versions of GitHub Enterprise Server and was fixed in version ...

6.1CVSS5.7AI score0.00144EPSS
CVE
CVE
added 2023/09/22 3:15 p.m.40 views

CVE-2023-23766

An incorrect comparison vulnerability was identified in GitHub Enterprise Server that allowed commit smuggling by displaying an incorrect diff in a re-opened Pull Request. To do so, an attacker would need write access to the repository. This vulnerability affected all versions of GitHub Enterprise ...

6.5CVSS5.4AI score0.00107EPSS
CVE
CVE
added 2024/07/16 10:15 p.m.39 views

CVE-2024-5817

An Incorrect Authorization vulnerability was identified in GitHub Enterprise Server that allowed read access to issue content via GitHub Projects. This was only exploitable in internal repositories and required the attacker to have access to the corresponding project board. This vulnerability affec...

6.5CVSS6.3AI score0.00122EPSS
CVE
CVE
added 2023/08/30 11:15 p.m.38 views

CVE-2023-23765

An incorrect comparison vulnerability was identified in GitHub Enterprise Server that allowed commit smuggling by displaying an incorrect diff in a re-opened Pull Request. To exploit this vulnerability, an attacker would need write access to the repository. This vulnerability was reported via the G...

6.5CVSS5.3AI score0.00076EPSS
CVE
CVE
added 2023/04/07 7:15 p.m.36 views

CVE-2023-23762

An incorrect comparison vulnerability was identified in GitHub Enterprise Server that allowed commit smuggling by displaying an incorrect diff. To do so, an attacker would need write access to the repository and be able to correctly guess the target branch before it’s created by the code maintainer...

6.5CVSS5.5AI score0.0013EPSS
CVE
CVE
added 2023/12/21 9:15 p.m.35 views

CVE-2023-46645

A path traversal vulnerability was identified in GitHub Enterprise Server that allowed arbitrary file reading when building a GitHub Pages site. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance. This vu...

6.8CVSS5.4AI score0.00531EPSS
CVE
CVE
added 2023/12/21 9:15 p.m.28 views

CVE-2023-6804

Improper privilege management allowed arbitrary workflows to be committed and run using an improperly scoped PAT. To exploit this, a workflow must have already existed in the target repo. This vulnerability affected all versions of GitHub Enterprise Server since 3.8 and was fixed in version 3.8.12,...

6.5CVSS5.9AI score0.00077EPSS
CVE
CVE
added 2024/03/21 2:51 a.m.21 views

CVE-2024-1908

An Improper Privilege Management vulnerability was identified in GitHub Enterprise Server that allowed an attacker to use the Enterprise Actions GitHub Connect download token to fetch private repository data. An attacker would require an account on the server instance with non-default settings for ...

6.3CVSS6.3AI score0.0016EPSS