
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability in GitHub Enterprise Server (CVE-2023-6804) was discovered that allowed improper privilege management where arbitrary workflows could be committed and run using an improperly scoped PAT. The vulnerability affected all versions of GitHub Enterprise Server since 3.8 and was fixed in versions 3.8.12, 3.9.7, 3.10.4, and 3.11.1 (NVD).
The vulnerability is classified as an Improper Privilege Management issue (CWE-269). To exploit this vulnerability, a workflow must have already existed in the target repository. The vulnerability has been assigned a CVSS v3.1 base score of 6.5 MEDIUM (Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L) by GitHub, and 5.5 MEDIUM (Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N) by NIST (NVD).
The vulnerability could allow attackers to commit and execute arbitrary workflows in repositories where a workflow already exists, potentially leading to unauthorized actions and privilege escalation within the affected GitHub Enterprise Server instances (NVD).
The vulnerability has been fixed in GitHub Enterprise Server versions 3.8.12, 3.9.7, 3.10.4, and 3.11.1. Organizations running affected versions should upgrade to the patched versions to mitigate this security risk (GitHub Release Notes).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."