Lucene search

K
cve[email protected]CVE-2023-6690
HistoryDec 21, 2023 - 9:15 p.m.

CVE-2023-6690

2023-12-2121:15:14
CWE-367
web.nvd.nist.gov
11
github enterprise server
race condition
administration permissions
graphql mutation
vulnerability
nvd
cve-2023-6690

3.9 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L

4 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

35.9%

A race condition in GitHub Enterprise Server allowed an existing admin to maintain permissions on transferred repositories by making a GraphQL mutation to alter repository permissions during the transfer.Β This vulnerability affected GitHub Enterprise Server version 3.8.0 and above and was fixed in version 3.8.12, 3.9.7, 3.10.4, and 3.11.1.

Affected configurations

Vulners
NVD
Node
githubenterprise_serverRange3.8–3.8.11
OR
githubenterprise_serverRange3.9–3.9.6
OR
githubenterprise_serverRange3.10–3.10.3
OR
githubenterprise_serverRange3.11–3.11.0
VendorProductVersionCPE
githubenterprise_server*cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
githubenterprise_server*cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
githubenterprise_server*cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
githubenterprise_server*cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "defaultStatus": "affected",
    "product": "Enterprise Server",
    "vendor": "GitHub",
    "versions": [
      {
        "changes": [
          {
            "at": "3.8.12",
            "status": "unaffected"
          }
        ],
        "lessThanOrEqual": "3.8.11",
        "status": "affected",
        "version": "3.8",
        "versionType": "semver"
      },
      {
        "changes": [
          {
            "at": "3.9.7",
            "status": "unaffected"
          }
        ],
        "lessThanOrEqual": "3.9.6",
        "status": "affected",
        "version": "3.9",
        "versionType": "semver"
      },
      {
        "changes": [
          {
            "at": "3.10.4",
            "status": "unaffected"
          }
        ],
        "lessThanOrEqual": "3.10.3",
        "status": "affected",
        "version": "3.10",
        "versionType": "semver"
      },
      {
        "changes": [
          {
            "at": "3.11.1",
            "status": "unaffected"
          }
        ],
        "lessThanOrEqual": "3.11.0",
        "status": "affected",
        "version": "3.11",
        "versionType": "semver"
      }
    ]
  }
]

3.9 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L

4 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

35.9%

Related for CVE-2023-6690