Vulnerabilities > CVE-2023-46646 - Authorization Bypass Through User-Controlled Key vulnerability in Github Enterprise Server
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
LOW Integrity impact
NONE Availability impact
NONE Summary
Improper access control in all versions of GitHub Enterprise Server allows unauthorized users to view private repository names via the "Get a check run" API endpoint. This vulnerability did not allow unauthorized access to any repository content besides the name. This vulnerability affected GitHub Enterprise Server version 3.7.0 and above and was fixed in version 3.17.19, 3.8.12, 3.9.7 3.10.4, and 3.11.0.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
References
- https://docs.github.com/en/[email protected]/admin/release-notes#3.10.4
- https://docs.github.com/en/[email protected]/admin/release-notes#3.10.4
- https://docs.github.com/en/[email protected]/admin/release-notes#3.7.19
- https://docs.github.com/en/[email protected]/admin/release-notes#3.7.19
- https://docs.github.com/en/[email protected]/admin/release-notes#3.8.12
- https://docs.github.com/en/[email protected]/admin/release-notes#3.8.12
- https://docs.github.com/en/[email protected]/admin/release-notes#3.9.7
- https://docs.github.com/en/[email protected]/admin/release-notes#3.9.7