First published: Tue Aug 02 2022(Updated: )
A stored XSS vulnerability was identified in GitHub Enterprise Server that allowed the injection of arbitrary attributes. This injection was blocked by Github's Content Security Policy (CSP). This vulnerability affected all versions of GitHub Enterprise Server prior to 3.6 and was fixed in versions 3.3.11, 3.4.6 and 3.5.3. This vulnerability was reported via the GitHub Bug Bounty program.
Credit: product-cna@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitHub Enterprise Server | >=3.3.0<3.3.11 | |
GitHub Enterprise Server | >=3.4.0<3.4.6 | |
GitHub Enterprise Server | >=3.5.0<3.5.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-23733 is a stored XSS vulnerability identified in GitHub Enterprise Server that allowed the injection of arbitrary attributes.
This vulnerability allows an attacker to inject arbitrary attributes, potentially leading to cross-site scripting (XSS) attacks.
All versions of GitHub Enterprise Server prior to 3.6 are affected by this vulnerability.
To fix the CVE-2022-23733 vulnerability, it is recommended to update GitHub Enterprise Server to version 3.6 or later.
You can find more information about CVE-2022-23733 in the official GitHub Enterprise Server release notes: [Link 1](https://docs.github.com/en/enterprise-server@3.3/admin/release-notes#3.3.11), [Link 2](https://docs.github.com/en/enterprise-server@3.4/admin/release-notes#3.4.6), [Link 3](https://docs.github.com/en/enterprise-server@3.5/admin/release-notes#3.5.3).