CVE-2023-23763

medium

Description

An authorization/sensitive information disclosure vulnerability was identified in GitHub Enterprise Server that allowed a fork to retain read access to an upstream repository after its visibility was changed to private. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.10.0 and was fixed in versions 3.9.4, 3.8.9, 3.7.16 and 3.6.18. This vulnerability was reported via the GitHub Bug Bounty program.

References

https://docs.github.com/en/[email protected]/admin/release-notes#3.9.4-security-fixes

https://docs.github.com/en/[email protected]/admin/release-notes#3.8.9-security-fixes

https://docs.github.com/en/[email protected]/admin/release-notes#3.7.16-security-fixes

https://docs.github.com/en/[email protected]/admin/release-notes#3.6.18-security-fixes

Details

Source: Mitre, NVD

Published: 2023-09-01

Updated: 2023-09-07

Risk Information

CVSS v2

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Severity: Medium

CVSS v3

Base Score: 5.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Severity: Medium