Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-27847 | An improper authentication vulnerability was identified in GitHub Enterprise Server that allowed an unauthorized actor to modify other users' secret gists by authenticating through an SSH certificate authority. To do so, a user had to know the secret gist's URL. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.9 and was fixed in versions 3.4.18, 3.5.15, 3.6.11, 3.7.8, and 3.8.1. This vulnerability was reported via the GitHub Bug Bounty program. |
Fri, 07 Feb 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_P
Published:
Updated: 2025-02-07T20:14:26.121Z
Reserved: 2023-01-17T20:40:37.553Z
Link: CVE-2023-23761
Updated: 2024-08-02T10:42:26.151Z
Status : Modified
Published: 2023-04-07T19:15:06.980
Modified: 2024-11-21T07:46:46.920
Link: CVE-2023-23761
No data.
OpenCVE Enrichment
No data.
EUVD