First published: Thu Dec 21 2023(Updated: )
Improper privilege management in all versions of GitHub Enterprise Server allows users with authorized access to the management console with an editor role to escalate their privileges by making requests to the endpoint used for bootstrapping the instance. This vulnerability affected GitHub Enterprise Server version 3.8.0 and above and was fixed in version 3.8.12, 3.9.6, 3.10.3, and 3.11.0.
Credit: product-cna@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitHub Enterprise Server | >=3.8.0<3.8.12 | |
GitHub Enterprise Server | >=3.9.0<3.9.6 | |
GitHub Enterprise Server | >=3.10.0<3.10.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-46647 is considered a critical vulnerability due to the potential for privilege escalation in GitHub Enterprise Server.
To fix CVE-2023-46647, you should upgrade your GitHub Enterprise Server to version 3.8.12, 3.9.6, or 3.10.3 or later.
CVE-2023-46647 affects all users with an editor role in the management console of GitHub Enterprise Server versions prior to the specified updates.
CVE-2023-46647 is categorized as an improper privilege management vulnerability.
The impact of CVE-2023-46647 allows users to escalate their privileges, potentially compromising the security of the GitHub Enterprise Server instance.