Description
An incorrect authorization vulnerability was identified in GitHub Enterprise Server that allowed issue comments to be read with an improperly scoped token. This vulnerability affected all versions of GitHub Enterprise Server since 3.7 and was fixed in version 3.7.19, 3.8.12, 3.9.7, 3.10.4, and 3.11.1.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-56101 | An incorrect authorization vulnerability was identified in GitHub Enterprise Server that allowed issue comments to be read with an improperly scoped token. This vulnerability affected all versions of GitHub Enterprise Server since 3.7 and was fixed in version 3.7.19, 3.8.12, 3.9.7, 3.10.4, and 3.11.1. |
References
History
No history.
Status: PUBLISHED
Assigner: GitHub_P
Published:
Updated: 2024-08-02T22:32:09.043Z
Reserved: 2023-12-18T17:47:35.907Z
Link: CVE-2023-51380
No data.
Status : Analyzed
Published: 2023-12-21T21:15:13.757
Modified: 2024-12-16T19:07:20.613
Link: CVE-2023-51380
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD