First published: Wed Apr 04 2012(Updated: )
GitHub Enterprise before 20120304 does not properly restrict the use of a hash to provide values for a model's attributes, which allows remote attackers to set the public_key[user_id] value via a modified URL for the public-key update form, related to a "mass assignment" vulnerability.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GitHub Enterprise | <20120304 | |
GitHub Enterprise | <=20120303 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-2055 is considered to be of medium severity due to its potential for unauthorized access to user attributes.
To fix CVE-2012-2055, you should upgrade GitHub Enterprise to version 20120304 or later.
CVE-2012-2055 is classified as a mass assignment vulnerability that affects the way user attributes can be set.
Users of GitHub Enterprise versions prior to 20120304 are affected by CVE-2012-2055.
Attackers exploiting CVE-2012-2055 can manipulate a URL to set unauthorized values for a user's public key.