Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2022-23732

Опубликовано: 05 апр. 2022
Источник: nvd
CVSS3: 8.8
CVSS2: 6.8
EPSS Низкий

Описание

A path traversal vulnerability was identified in GitHub Enterprise Server management console that allowed the bypass of CSRF protections. This could potentially lead to privilege escalation. To exploit this vulnerability, an attacker would need to target a user that was actively logged into the management console. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.5 and was fixed in versions 3.1.19, 3.2.11, 3.3.6, 3.4.1. This vulnerability was reported via the GitHub Bug Bounty program.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
Версия до 3.1.19 (исключая)
cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
Версия от 3.2.0 (включая) до 3.2.11 (исключая)
cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
Версия от 3.3.0 (включая) до 3.3.6 (исключая)
cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
Версия от 3.4.0 (включая) до 3.4.1 (исключая)

EPSS

Процентиль: 64%
0.00476
Низкий

8.8 High

CVSS3

6.8 Medium

CVSS2

Дефекты

CWE-23
CWE-22

Связанные уязвимости

CVSS3: 8.8
github
почти 4 года назад

A path traversal vulnerability was identified in GitHub Enterprise Server management console that allowed the bypass of CSRF protections. This could potentially lead to privilege escalation. To exploit this vulnerability, an attacker would need to target a user that was actively logged into the management console. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.5 and was fixed in versions 3.1.19, 3.2.11, 3.3.6, 3.4.1. This vulnerability was reported via the GitHub Bug Bounty program.

EPSS

Процентиль: 64%
0.00476
Низкий

8.8 High

CVSS3

6.8 Medium

CVSS2

Дефекты

CWE-23
CWE-22