First published: Wed Aug 30 2023(Updated: )
An incorrect comparison vulnerability was identified in GitHub Enterprise Server that allowed commit smuggling by displaying an incorrect diff in a re-opened Pull Request. To exploit this vulnerability, an attacker would need write access to the repository. This vulnerability was reported via the GitHub Bug Bounty Program https://bounty.github.com/ .
Credit: product-cna@github.com product-cna@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitHub Enterprise Server | >=3.6.0<3.6.16 | |
GitHub Enterprise Server | >=3.7.0<3.7.13 | |
GitHub Enterprise Server | >=3.8.0<3.8.6 | |
GitHub Enterprise Server | =3.9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-23765 is an incorrect comparison vulnerability in GitHub Enterprise Server that allows commit smuggling by displaying an incorrect diff in a re-opened Pull Request.
CVE-2023-23765 has a severity rating of 6.5 (Medium).
GitHub Enterprise Server versions 3.6.0 to 3.6.16, 3.7.0 to 3.7.13, 3.8.0 to 3.8.6, and 3.9.0 are affected by CVE-2023-23765.
To exploit CVE-2023-23765, an attacker would need write access to the repository.
You can find more information about CVE-2023-23765 in the GitHub Enterprise Server release notes linked in the references section.