
Cloud Vulnerability DB
A community-led vulnerabilities database
A path traversal vulnerability (CVE-2023-23760) was identified in GitHub Enterprise Server that allowed remote code execution when building a GitHub Pages site. The vulnerability was discovered and reported through the GitHub Bug Bounty Program. The vulnerability affected all versions of GitHub Enterprise Server prior to versions 3.8 and was fixed in versions 3.7.7, 3.6.10, 3.5.14, and 3.4.17 (GitHub Release Notes).
The vulnerability is classified as CWE-22 (Improper Limitation of a Pathname to a Restricted Directory - 'Path Traversal'). According to the National Vulnerability Database, it received a CVSS v3.1 Base Score of 8.8 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H. GitHub's own assessment rated it with a CVSS score of 4.9 (MEDIUM) with the vector string CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N (NVD).
The vulnerability could allow an attacker to execute remote code on the GitHub Enterprise Server instance. However, exploitation required the attacker to have permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance (NVD).
The vulnerability has been patched in multiple versions of GitHub Enterprise Server. Users should upgrade to one of the following fixed versions: 3.7.7, 3.6.10, 3.5.14, or 3.4.17. These patches were released as part of the security updates for the affected versions (GitHub Release Notes).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."