First published: Wed Mar 03 2021(Updated: )
An improper access control vulnerability was identified in GitHub Enterprise Server that allowed an authenticated user with the ability to fork a repository to disclose Actions secrets for the parent repository of the fork. This vulnerability existed due to a flaw that allowed the base reference of a pull request to be updated to point to an arbitrary SHA or another pull request outside of the fork repository. By establishing this incorrect reference in a PR, the restrictions that limit the Actions secrets sent a workflow from forks could be bypassed. This vulnerability affected GitHub Enterprise Server version 3.0.0, 3.0.0.rc2, and 3.0.0.rc1. This vulnerability was reported via the GitHub Bug Bounty program.
Credit: product-cna@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitHub GitHub | =3.0.0 | |
GitHub GitHub | =3.0.0-rc1 | |
GitHub GitHub | =3.0.0-rc2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2021-22862.
The severity of CVE-2021-22862 is medium with a severity value of 6.5.
CVE-2021-22862 affects GitHub Enterprise Server version 3.0.0 and 3.0.0-rc1, and 3.0.0-rc2.
To fix CVE-2021-22862, update GitHub Enterprise Server to version 3.0.1 or later.
You can find more information about CVE-2021-22862 in the GitHub Enterprise Server release notes at https://docs.github.com/en/enterprise-server@3.0/admin/release-notes#3.0.1.