Описание
A path traversal vulnerability was identified in GitHub Enterprise Server that allowed remote code execution when building a GitHub Pages site. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the instance. This vulnerability was fixed in versions 3.3.17, 3.4.12, 3.5.9, 3.6.5 and 3.7.2. This vulnerability was reported via the GitHub Bug Bounty program.
A path traversal vulnerability was identified in GitHub Enterprise Server that allowed remote code execution when building a GitHub Pages site. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the instance. This vulnerability was fixed in versions 3.3.17, 3.4.12, 3.5.9, 3.6.5 and 3.7.2. This vulnerability was reported via the GitHub Bug Bounty program.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2022-46256
- https://docs.github.com/en/enterprise-server%403.3/admin/release-notes#3.3.17
- https://docs.github.com/en/enterprise-server%403.4/admin/release-notes#3.4.12
- https://docs.github.com/en/enterprise-server%403.5/admin/release-notes#3.5.9
- https://docs.github.com/en/enterprise-server%403.6/admin/release-notes#3.6.5
- https://docs.github.com/en/enterprise-server%403.7/admin/release-notes#3.7.2
- https://docs.github.com/en/enterprise-server@3.3/admin/release-notes#3.3.17
- https://docs.github.com/en/enterprise-server@3.4/admin/release-notes#3.4.12
- https://docs.github.com/en/enterprise-server@3.5/admin/release-notes#3.5.9
- https://docs.github.com/en/enterprise-server@3.6/admin/release-notes#3.6.5
- https://docs.github.com/en/enterprise-server@3.7/admin/release-notes#3.7.2
Связанные уязвимости
A path traversal vulnerability was identified in GitHub Enterprise Server that allowed remote code execution when building a GitHub Pages site. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the instance. This vulnerability was fixed in versions 3.3.17, 3.4.12, 3.5.9, 3.6.5 and 3.7.2. This vulnerability was reported via the GitHub Bug Bounty program.