First published: Wed Mar 03 2021(Updated: )
A remote code execution vulnerability was identified in GitHub Enterprise Server that could be exploited when building a GitHub Pages site. User-controlled configuration of the underlying parsers used by GitHub Pages were not sufficiently restricted and made it possible to execute commands on the GitHub Enterprise Server instance. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance. This vulnerability affected all versions of GitHub Enterprise Server prior to 2.22.7 and was fixed in 2.22.7, 2.21.15, and 2.20.24. The underlying issues contributing to this vulnerability were identified through the GitHub Security Bug Bounty program.
Credit: product-cna@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitHub GitHub | <2.20.24 | |
GitHub GitHub | >=2.21.0<2.21.15 | |
GitHub GitHub | >=2.22.0<2.22.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this remote code execution vulnerability is CVE-2020-10519.
CVE-2020-10519 has a severity rating of 8.8, which is classified as high.
The vulnerability occurs when building a GitHub Pages site, where user-controlled configuration of the underlying parsers is not sufficiently restricted.
GitHub Enterprise Server versions 2.20.24, 2.21.0 to 2.21.15, and 2.22.0 to 2.22.7 are affected by this vulnerability.
To mitigate the vulnerability, users should update their GitHub Enterprise Server to a patched version, as mentioned in the associated release notes.