First published: Fri Sep 22 2023(Updated: )
An incorrect comparison vulnerability was identified in GitHub Enterprise Server that allowed commit smuggling by displaying an incorrect diff in a re-opened Pull Request. To do so, an attacker would need write access to the repository. This vulnerability affected all versions of GitHub Enterprise Server and was fixed in versions 3.6.17, 3.7.15, 3.8.8, 3.9.3, and 3.10.1. This vulnerability was reported via the GitHub Bug Bounty program.
Credit: product-cna@github.com product-cna@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitHub Enterprise Server | <3.6.17 | |
GitHub Enterprise Server | >=3.7.0<3.7.15 | |
GitHub Enterprise Server | >=3.8.0<3.8.8 | |
GitHub Enterprise Server | >=3.9.0<3.9.3 | |
GitHub Enterprise Server | =3.10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-23766.
The severity of CVE-2023-23766 is medium (6.5).
This vulnerability affects GitHub Enterprise Server versions 3.6.0 up to (excluding) 3.6.17, versions 3.7.0 up to (excluding) 3.7.15, versions 3.8.0 up to (excluding) 3.8.8, versions 3.9.0 up to (excluding) 3.9.3, and version 3.10.0.
To exploit this vulnerability, the attacker would need write access to the repository and would be able to perform commit smuggling by displaying an incorrect diff in a re-opened Pull Request.
You can find more information about this vulnerability in the GitHub Enterprise Server release notes: [3.10.1](https://docs.github.com/enterprise-server@3.10/admin/release-notes#3-10-1), [3.6.17](https://docs.github.com/enterprise-server@3.6/admin/release-notes#3-6-17), and [3.7.15](https://docs.github.com/enterprise-server@3.7/admin/release-notes#3-7-15).