Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2022-46258

Опубликовано: 09 янв. 2023
Источник: nvd
CVSS3: 6.5
EPSS Низкий

Описание

An incorrect authorization vulnerability was identified in GitHub Enterprise Server that allowed a repository-scoped token with read/write access to modify Action Workflow files without a Workflow scope. The Create or Update file contents API should enforce workflow scope. This vulnerability affected all versions of GitHub Enterprise Server prior to version 3.7 and was fixed in versions 3.3.16, 3.4.11, 3.5.8, and 3.6.4. This vulnerability was reported via the GitHub Bug Bounty program.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
Версия до 3.3.16 (исключая)
cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
Версия от 3.4.0 (включая) до 3.4.11 (исключая)
cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
Версия от 3.5.0 (включая) до 3.5.8 (исключая)
cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
Версия от 3.6.0 (включая) до 3.6.4 (исключая)

EPSS

Процентиль: 51%
0.00285
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-863
CWE-863

Связанные уязвимости

CVSS3: 6.5
github
около 3 лет назад

An incorrect authorization vulnerability was identified in GitHub Enterprise Server that allowed a repository-scoped token with read/write access to modify Action Workflow files without a Workflow scope. The Create or Update file contents API should enforce workflow scope. This vulnerability affected all versions of GitHub Enterprise Server prior to version 3.7 and was fixed in versions 3.3.16, 3.4.11, 3.5.8, and 3.6.4. This vulnerability was reported via the GitHub Bug Bounty program.

EPSS

Процентиль: 51%
0.00285
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-863
CWE-863