Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2020-10519

Опубликовано: 03 мар. 2021
Источник: nvd
CVSS3: 8.8
CVSS2: 6.5
EPSS Низкий

Описание

A remote code execution vulnerability was identified in GitHub Enterprise Server that could be exploited when building a GitHub Pages site. User-controlled configuration of the underlying parsers used by GitHub Pages were not sufficiently restricted and made it possible to execute commands on the GitHub Enterprise Server instance. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance. This vulnerability affected all versions of GitHub Enterprise Server prior to 2.22.7 and was fixed in 2.22.7, 2.21.15, and 2.20.24. The underlying issues contributing to this vulnerability were identified through the GitHub Security Bug Bounty program.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:github:github:*:*:*:*:enterprise:*:*:*
Версия до 2.20.24 (исключая)
cpe:2.3:a:github:github:*:*:*:*:enterprise:*:*:*
Версия от 2.21.0 (включая) до 2.21.15 (исключая)
cpe:2.3:a:github:github:*:*:*:*:enterprise:*:*:*
Версия от 2.22.0 (включая) до 2.22.7 (исключая)

EPSS

Процентиль: 83%
0.01898
Низкий

8.8 High

CVSS3

6.5 Medium

CVSS2

Дефекты

CWE-77
NVD-CWE-noinfo

Связанные уязвимости

github
больше 3 лет назад

A remote code execution vulnerability was identified in GitHub Enterprise Server that could be exploited when building a GitHub Pages site. User-controlled configuration of the underlying parsers used by GitHub Pages were not sufficiently restricted and made it possible to execute commands on the GitHub Enterprise Server instance. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance. This vulnerability affected all versions of GitHub Enterprise Server prior to 2.22.7 and was fixed in 2.22.7, 2.21.15, and 2.20.24. The underlying issues contributing to this vulnerability were identified through the GitHub Security Bug Bounty program.

EPSS

Процентиль: 83%
0.01898
Низкий

8.8 High

CVSS3

6.5 Medium

CVSS2

Дефекты

CWE-77
NVD-CWE-noinfo