Vulnerability Description
GitHub Enterprise before 20120304 does not properly restrict the use of a hash to provide values for a model's attributes, which allows remote attackers to set the public_key[user_id] value via a modified URL for the public-key update form, related to a "mass assignment" vulnerability.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Github | Github | < 20120304 |
Related Weaknesses (CWE)
References
- http://homakov.blogspot.com/2012/03/how-to.htmlIssue Tracking
- http://lwn.net/Articles/488702/Third Party Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/74812Third Party AdvisoryVDB Entry
- https://github.com/blog/1068-public-key-security-vulnerability-and-mitigationVendor Advisory
- http://homakov.blogspot.com/2012/03/how-to.htmlIssue Tracking
- http://lwn.net/Articles/488702/Third Party Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/74812Third Party AdvisoryVDB Entry
- https://github.com/blog/1068-public-key-security-vulnerability-and-mitigationVendor Advisory
FAQ
What is CVE-2012-2055?
CVE-2012-2055 is a vulnerability with a CVSS score of 7.5 (HIGH). GitHub Enterprise before 20120304 does not properly restrict the use of a hash to provide values for a model's attributes, which allows remote attackers to set the public_key[user_id] value via a modi...
How severe is CVE-2012-2055?
CVE-2012-2055 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2012-2055?
Check the references section above for vendor advisories and patch information. Affected products include: Github Github.