Lucene search

K
GithubEnterprise Server

20 matches found

CVE
CVE
added 2022/04/05 12:15 a.m.112 views

CVE-2022-23732

A path traversal vulnerability was identified in GitHub Enterprise Server management console that allowed the bypass of CSRF protections. This could potentially lead to privilege escalation. To exploit this vulnerability, an attacker would need to target a user that was actively logged into the man...

8.8CVSS8.7AI score0.00556EPSS
CVE
CVE
added 2022/02/18 12:15 a.m.87 views

CVE-2021-41599

A remote code execution vulnerability was identified in GitHub Enterprise Server that could be exploited when building a GitHub Pages site. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance. This vulnera...

8.8CVSS8.9AI score0.02496EPSS
CVE
CVE
added 2024/02/13 7:15 p.m.87 views

CVE-2024-1354

A command injection vulnerability was identified in GitHub Enterprise Server that allowed an attacker with an editor role in the Management Console to gain admin SSH access to the appliance via the syslog-ng configuration file. Exploitation of this vulnerability required access to the GitHub Enterp...

8CVSS8.1AI score0.00303EPSS
CVE
CVE
added 2021/05/14 9:15 p.m.74 views

CVE-2021-22866

A UI misrepresentation vulnerability was identified in GitHub Enterprise Server that allowed more permissions to be granted during a GitHub App's user-authorization web flow than was displayed to the user during approval. To exploit this vulnerability, an attacker would need to create a GitHub App ...

8.8CVSS8.8AI score0.00203EPSS
CVE
CVE
added 2024/03/20 11:15 p.m.65 views

CVE-2024-2469

An attacker with an Administrator role in GitHub Enterprise Server could gain SSH root access via remote code execution. This vulnerability affected GitHub Enterprise Server version 3.8.0 and above and was fixed in version 3.8.17, 3.9.12, 3.10.9, 3.11.7 and 3.12.1. This vulnerability was reported v...

8CVSS8.2AI score0.00633EPSS
CVE
CVE
added 2022/10/19 2:15 p.m.59 views

CVE-2022-23734

A deserialization of untrusted data vulnerability was identified in GitHub Enterprise Server that could potentially lead to remote code execution on the SVNBridge. To exploit this vulnerability, an attacker would need to gain access via a server-side request forgery (SSRF) that would let an attacke...

8.8CVSS9.2AI score0.01231EPSS
CVE
CVE
added 2022/11/23 6:15 p.m.58 views

CVE-2022-23740

CRITICAL: An improper neutralization of argument delimiters in a command vulnerability was identified in GitHub Enterprise Server that enabled remote code execution. To exploit this vulnerability, an attacker would need permission to create and build GitHub Pages using GitHub Actions. This vulnerab...

8.8CVSS9.1AI score0.0147EPSS
CVE
CVE
added 2022/12/14 6:15 p.m.58 views

CVE-2022-46256

A path traversal vulnerability was identified in GitHub Enterprise Server that allowed remote code execution when building a GitHub Pages site. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the instance. This vulnerability was fixed in v...

8.8CVSS8.9AI score0.03887EPSS
CVE
CVE
added 2024/11/07 10:15 p.m.58 views

CVE-2024-8810

A GitHub App installed in organizations could upgrade some permissions from read to write access without approval from an organization administrator. An attacker would require an account with administrator access to install a malicious GitHub App. This vulnerability affected all versions of GitHub ...

8.7CVSS6.3AI score0.00123EPSS
CVE
CVE
added 2021/03/23 10:15 p.m.57 views

CVE-2021-22864

A remote code execution vulnerability was identified in GitHub Enterprise Server that could be exploited when building a GitHub Pages site. User-controlled configuration options used by GitHub Pages were not sufficiently restricted and made it possible to override environment variables leading to c...

8.8CVSS8.9AI score0.02496EPSS
CVE
CVE
added 2024/04/19 3:15 p.m.57 views

CVE-2024-3684

A server side request forgery vulnerability was identified in GitHub Enterprise Server that allowed an attacker with an editor role in the Management Console to gain admin access to the appliance when configuring the Artifacts & Logs and Migrations Storage. Exploitation of this vulnerability requir...

8CVSS6.9AI score0.00526EPSS
CVE
CVE
added 2023/03/02 9:15 p.m.55 views

CVE-2023-22381

A code injection vulnerability was identified in GitHub Enterprise Server that allowed setting arbitrary environment variables from a single environment variable value in GitHub Actions when using a Windows based runner. To exploit this vulnerability, an attacker would need existing permission to c...

8.8CVSS6.6AI score0.00111EPSS
CVE
CVE
added 2022/01/25 8:15 p.m.48 views

CVE-2021-41598

A UI misrepresentation vulnerability was identified in GitHub Enterprise Server that allowed more permissions to be granted during a GitHub App's user-authorization web flow than was displayed to the user during approval. To exploit this vulnerability, an attacker would need to create a GitHub App ...

8.8CVSS8.8AI score0.00272EPSS
CVE
CVE
added 2024/04/19 3:15 p.m.47 views

CVE-2024-3646

A command injection vulnerability was identified in GitHub Enterprise Server that allowed an attacker with an editor role in the Management Console to gain admin SSH access to the instance when configuring the chat integration. Exploitation of this vulnerability required access to the GitHub Enterp...

8CVSS7.4AI score0.00468EPSS
CVE
CVE
added 2023/03/08 7:15 p.m.43 views

CVE-2023-23760

A path traversal vulnerability was identified in GitHub Enterprise Server that allowed remote code execution when building a GitHub Pages site. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance. This vul...

8.8CVSS7.2AI score0.00429EPSS
CVE
CVE
added 2024/11/07 9:15 p.m.41 views

CVE-2024-10007

A path collision and arbitrary code execution vulnerability was identified in GitHub Enterprise Server that allowed container escape to escalate to root via ghe-firejail path. Exploitation of this vulnerability requires Enterprise Administrator access to the GitHub Enterprise Server instance. This ...

8.7CVSS7.4AI score0.00194EPSS
CVE
CVE
added 2024/01/16 7:15 p.m.40 views

CVE-2024-0507

An attacker with access to a Management Console user account with the editor role could escalate privileges through a command injection vulnerability in the Management Console. This vulnerability affected all versions of GitHub Enterprise Server and was fixed in versions 3.11.3, 3.10.5, 3.9.8, and ...

8.8CVSS7.7AI score0.77442EPSS
CVE
CVE
added 2023/12/21 9:15 p.m.39 views

CVE-2023-6746

An insertion of sensitive information into log file vulnerability was identified in the log files for a GitHub Enterprise Server back-end service that could permit an adversary in the middle attack when combined with other phishing techniques. To exploit this, an attacker would need access to the l...

8.1CVSS5.4AI score0.00181EPSS
CVE
CVE
added 2023/12/21 9:15 p.m.34 views

CVE-2023-46647

Improper privilege management in all versions of GitHub Enterprise Server allows users with authorized access to the management console with an editor role to escalate their privileges by making requests to the endpoint used for bootstrapping the instance. This vulnerability affected GitHub Enterpr...

8.8CVSS8.6AI score0.005EPSS
CVE
CVE
added 2023/12/21 9:15 p.m.26 views

CVE-2023-46648

An insufficient entropy vulnerability was identified in GitHub Enterprise Server (GHES) that allowed an attacker to brute force a user invitation to the GHES Management Console. To exploit this vulnerability, an attacker would need knowledge that a user invitation was pending. This vulnerability af...

8.3CVSS7.6AI score0.01027EPSS