First published: Wed Nov 10 2021(Updated: )
A path traversal vulnerability was identified in GitHub Pages builds on GitHub Enterprise Server that could allow an attacker to read system files. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.3 and was fixed in versions 3.0.19, 3.1.11, and 3.2.3. This vulnerability was reported via the GitHub Bug Bounty program.
Credit: product-cna@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitHub Enterprise Server | <3.0.19 | |
GitHub Enterprise Server | >=3.1.0<3.1.11 | |
GitHub Enterprise Server | >=3.2.0<3.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22870 is a path traversal vulnerability in GitHub Pages builds on GitHub Enterprise Server that allows an attacker to read system files.
To exploit CVE-2021-22870, an attacker would need permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance.
The severity of CVE-2021-22870 is medium, with a CVSS score of 6.5.
GitHub Enterprise Server versions up to 3.0.19, 3.1.0 to 3.1.11, and 3.2.0 to 3.2.3 are affected by CVE-2021-22870.
To fix CVE-2021-22870, it is recommended to upgrade GitHub Enterprise Server to a version that is not affected.