First published: Fri Apr 07 2023(Updated: )
An incorrect comparison vulnerability was identified in GitHub Enterprise Server that allowed commit smuggling by displaying an incorrect diff. To do so, an attacker would need write access to the repository and be able to correctly guess the target branch before it’s created by the code maintainer. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.9 and was fixed in versions 3.4.18, 3.5.15, 3.6.11, 3.7.8, and 3.8.1. This vulnerability was reported via the GitHub Bug Bounty program.
Credit: product-cna@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitHub Enterprise Server | <3.4.18 | |
GitHub Enterprise Server | >=3.5.0<3.5.15 | |
GitHub Enterprise Server | >=3.6.0<3.6.11 | |
GitHub Enterprise Server | >=3.7.0<3.7.8 | |
GitHub Enterprise Server | =3.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-23762 is an incorrect comparison vulnerability in GitHub Enterprise Server that allows commit smuggling by displaying an incorrect diff.
The severity of CVE-2023-23762 is medium with a CVSS score of 5.3.
An attacker with write access to the repository can exploit CVE-2023-23762 by correctly guessing the target branch before it's created by the code maintainer.
GitHub Enterprise Server versions up to (but not including) 3.4.18, between 3.5.0 and 3.5.15, between 3.6.0 and 3.6.11, and between 3.7.0 and 3.7.8 are affected by CVE-2023-23762.
To fix CVE-2023-23762, update GitHub Enterprise Server to version 3.8.0 or later.