CVE-2022-23740
Summary
| CVE | CVE-2022-23740 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2022-11-23 18:15:00 UTC |
| Updated | 2023-11-07 03:44:00 UTC |
| Description | CRITICAL: An improper neutralization of argument delimiters in a command vulnerability was identified in GitHub Enterprise Server that enabled remote code execution. To exploit this vulnerability, an attacker would need permission to create and build GitHub Pages using GitHub Actions. This vulnerability affected only version 3.7.0 of GitHub Enterprise Server and was fixed in version 3.7.1. This vulnerability was reported via the GitHub Bug Bounty program. |
Risk And Classification
Problem Types: CWE-88
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Github | Enterprise Server | 3.7.0 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Release notes - GitHub Enterprise Server 3.7 Docs | MISC | docs.github.com | |
| Release notes - GitHub Enterprise Server 3.7 Docs | docs.github.com | ||
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
LEGACY: yvvdwf
There are currently no legacy QID mappings associated with this CVE.