CVE-2022-46256

A path traversal vulnerability was identified in GitHub Enterprise Server that allowed remote code execution when building a GitHub Pages site. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the instance. This vulnerability was fixed in versions 3.3.17, 3.4.12, 3.5.9, 3.6.5 and 3.7.2. This vulnerability was reported via the GitHub Bug Bounty program.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*

History

16 Dec 2022, 21:17

Type Values Removed Values Added
New CVE

Information

Published : 2022-12-14 18:15

Updated : 2024-02-04 23:14


NVD link : CVE-2022-46256

Mitre link : CVE-2022-46256

CVE.ORG link : CVE-2022-46256


JSON object : View

Products Affected

github

  • enterprise_server
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')