Vulnerability Description
An incorrect comparison vulnerability was identified in GitHub Enterprise Server that allowed commit smuggling by displaying an incorrect diff in a re-opened Pull Request. To exploit this vulnerability, an attacker would need write access to the repository. This vulnerability was reported via the GitHub Bug Bounty Program https://bounty.github.com/ .
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Github | Enterprise Server | >= 3.6.0, < 3.6.16 |
Related Weaknesses (CWE)
References
- https://docs.github.com/en/[email protected]/admin/release-notes#3.6.16Release Notes
- https://docs.github.com/en/[email protected]/admin/release-notes#3.7.13Release Notes
- https://docs.github.com/en/[email protected]/admin/release-notes#3.8.9Release Notes
- https://docs.github.com/en/[email protected]/admin/release-notes#3.9.1Release Notes
- https://docs.github.com/en/[email protected]/admin/release-notes#3.6.16Release Notes
- https://docs.github.com/en/[email protected]/admin/release-notes#3.7.13Release Notes
- https://docs.github.com/en/[email protected]/admin/release-notes#3.8.9Release Notes
- https://docs.github.com/en/[email protected]/admin/release-notes#3.9.1Release Notes
FAQ
What is CVE-2023-23765?
CVE-2023-23765 is a vulnerability with a CVSS score of 4.8 (MEDIUM). An incorrect comparison vulnerability was identified in GitHub Enterprise Server that allowed commit smuggling by displaying an incorrect diff in a re-opened Pull Request. To exploit this vulnerabilit...
How severe is CVE-2023-23765?
CVE-2023-23765 has been rated MEDIUM with a CVSS base score of 4.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-23765?
Check the references section above for vendor advisories and patch information. Affected products include: Github Enterprise Server.