First published: Thu Dec 21 2023(Updated: )
An incorrect authorization vulnerability was identified in GitHub Enterprise Server that allowed issue comments to be read with an improperly scoped token. This vulnerability affected all versions of GitHub Enterprise Server since 3.7 and was fixed in version 3.7.19, 3.8.12, 3.9.7, 3.10.4, and 3.11.1.
Credit: product-cna@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitHub Enterprise | >=3.7.0<3.7.19 | |
GitHub Enterprise | >=3.8.0<3.8.12 | |
GitHub Enterprise | >=3.9.0<3.9.7 | |
GitHub Enterprise | >=3.10.0<3.10.4 | |
GitHub Enterprise | =3.11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-51380 is classified as a high-severity vulnerability due to the risk of unauthorized access to issue comments.
To fix CVE-2023-51380, you must upgrade GitHub Enterprise Server to version 3.7.19, 3.8.12, 3.9.7, or higher.
CVE-2023-51380 affects all versions of GitHub Enterprise Server prior to 3.7.19, 3.8.12, and 3.9.7.
CVE-2023-51380 is an incorrect authorization vulnerability.
CVE-2023-51380 can lead to potential unauthorized access to sensitive issue comments.