First published: Thu Dec 21 2023(Updated: )
An improper authentication vulnerability was identified in GitHub Enterprise Server that allowed a bypass of Private Mode by using a specially crafted API request. To exploit this vulnerability, an attacker would need network access to the Enterprise Server appliance configured in Private Mode. This vulnerability affected all versions of GitHub Enterprise Server since 3.9 and was fixed in version 3.9.7, 3.10.4, and 3.11.1. This vulnerability was reported via the GitHub Bug Bounty program.
Credit: product-cna@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitHub Enterprise Server | >=3.9.0<3.9.7 | |
GitHub Enterprise Server | >=3.10.0<3.10.4 | |
GitHub Enterprise Server | =3.11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6847 is classified as a high severity vulnerability due to its impact on authentication and access control.
To remediate CVE-2023-6847, upgrade GitHub Enterprise Server to version 3.9.7, 3.10.4, or 3.11.1 as applicable.
CVE-2023-6847 affects GitHub Enterprise Server versions 3.9.0 to 3.9.7, 3.10.0 to 3.10.4, and the exact version 3.11.0.
Yes, CVE-2023-6847 can be exploited remotely if an attacker has network access to the GitHub Enterprise Server appliance.
The attack vector for CVE-2023-6847 involves sending specially crafted API requests to bypass Private Mode.