An improper access control vulnerability was identified in the GitHub Enterprise Server API that allowed an organization member to escalate permissions and gain access to unauthorized repositories within an organization. This vulnerability affected all versions of GitHub Enterprise Server prior to 2.21 and was fixed in 2.20.9, 2.19.15, and 2.18.20. This vulnerability was reported via the GitHub Bug Bounty program.
References
Link | Resource |
---|---|
https://enterprise.github.com/releases/2.18.20/notes | Release Notes Third Party Advisory |
https://enterprise.github.com/releases/2.20.9/notes | Release Notes Third Party Advisory |
https://enterprise.github.com/releases/2.19.15/notes | Release Notes Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2020-06-03 07:15
Updated : 2020-06-05 07:38
NVD link : CVE-2020-10516
Mitre link : CVE-2020-10516
JSON object : View
CWE
CWE-552
Files or Directories Accessible to External Parties
Products Affected
github
- github