CVE-2023-23763
Summary
| CVE | CVE-2023-23763 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-09-01 15:15:00 UTC |
| Updated | 2023-09-07 19:53:00 UTC |
| Description | An authorization/sensitive information disclosure vulnerability was identified in GitHub Enterprise Server that allowed a fork to retain read access to an upstream repository after its visibility was changed to private. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.10.0 and was fixed in versions 3.9.4, 3.8.9, 3.7.16 and 3.6.18. This vulnerability was reported via the GitHub Bug Bounty program. |
Risk And Classification
Problem Types: CWE-862
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Github | Enterprise Server | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Release notes - GitHub Enterprise Server 3.9 Docs | MISC | docs.github.com | |
| Release notes - GitHub Enterprise Server 3.8 Docs | MISC | docs.github.com | |
| Release notes - GitHub Enterprise Server 3.7 Docs | MISC | docs.github.com | |
| Release notes - GitHub Enterprise Server 3.6 Docs | MISC | docs.github.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.