First published: Thu Dec 21 2023(Updated: )
A race condition in GitHub Enterprise Server allowed an existing admin to maintain permissions on transferred repositories by making a GraphQL mutation to alter repository permissions during the transfer. This vulnerability affected GitHub Enterprise Server version 3.8.0 and above and was fixed in version 3.8.12, 3.9.7, 3.10.4, and 3.11.1.
Credit: product-cna@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitHub Enterprise | >=3.8.0<3.8.12 | |
GitHub Enterprise | >=3.9.0<3.9.7 | |
GitHub Enterprise | >=3.10.0<3.10.4 | |
GitHub Enterprise | =3.11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6690 is classified as a moderate vulnerability due to its potential impact on repository permission integrity.
To fix CVE-2023-6690, upgrade GitHub Enterprise Server to version 3.8.12, 3.9.7, 3.10.4, or later.
CVE-2023-6690 affects administrators using GitHub Enterprise Server versions 3.8.0 through 3.11.0.
CVE-2023-6690 is a race condition vulnerability that allows privilege escalation during repository transfers.
CVE-2023-6690 was disclosed in 2023 and affects multiple versions of GitHub Enterprise Server.