"-Synchronized-Data."

This commit is contained in:
CVE Team 2022-02-18 00:01:21 +00:00
parent 773dfd01d9
commit 141d7709c4
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
6 changed files with 111 additions and 83 deletions

View File

@ -1,91 +1,94 @@
{
"CVE_data_meta": {
"ASSIGNER": "product-cna@github.com",
"ID": "CVE-2021-41599",
"STATE": "PUBLIC",
"TITLE": "Improper control flow in GitHub Enterprise Server hosted Pages leads to remote code execution"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "GitHub Enterprise Server",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "3.0",
"version_value": "3.0.21"
"CVE_data_meta": {
"ASSIGNER": "product-cna@github.com",
"ID": "CVE-2021-41599",
"STATE": "PUBLIC",
"TITLE": "Improper control flow in GitHub Enterprise Server hosted Pages leads to remote code execution"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "GitHub Enterprise Server",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "3.0",
"version_value": "3.0.21"
},
{
"version_affected": "<",
"version_name": "3.1",
"version_value": "3.1.13"
},
{
"version_affected": "<",
"version_name": "3.2",
"version_value": "3.2.5"
}
]
}
}
]
},
{
"version_affected": "<",
"version_name": "3.1",
"version_value": "3.1.13"
},
{
"version_affected": "<",
"version_name": "3.2",
"version_value": "3.2.5"
}
]
"vendor_name": "GitHub"
}
}
]
},
"vendor_name": "GitHub"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "yvvdwf"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A remote code execution vulnerability was identified in GitHub Enterprise Server that could be exploited when building a GitHub Pages site. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.3 and was fixed in versions 3.0.21, 3.1.13, 3.2.5. This vulnerability was reported via the GitHub Bug Bounty program."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
},
"credit": [
{
"lang": "eng",
"value": "CWE-77, CWE-691, CWE-459"
}
"value": "yvvdwf"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A remote code execution vulnerability was identified in GitHub Enterprise Server that could be exploited when building a GitHub Pages site. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.3 and was fixed in versions 3.0.21, 3.1.13, 3.2.5. This vulnerability was reported via the GitHub Bug Bounty program."
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://docs.github.com/en/enterprise-server@3.0/admin/release-notes#3.0.21"
},
{
"refsource": "CONFIRM",
"url": "https://docs.github.com/en/enterprise-server@3.1/admin/release-notes#3.1.13"
},
{
"refsource": "CONFIRM",
"url": "https://docs.github.com/en/enterprise-server@3.2/admin/release-notes#3.2.5"
}
]
},
"source": {
"discovery": "EXTERNAL"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-77, CWE-691, CWE-459"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://docs.github.com/en/enterprise-server@3.0/admin/release-notes#3.0.21",
"name": "https://docs.github.com/en/enterprise-server@3.0/admin/release-notes#3.0.21"
},
{
"refsource": "MISC",
"url": "https://docs.github.com/en/enterprise-server@3.1/admin/release-notes#3.1.13",
"name": "https://docs.github.com/en/enterprise-server@3.1/admin/release-notes#3.1.13"
},
{
"refsource": "MISC",
"url": "https://docs.github.com/en/enterprise-server@3.2/admin/release-notes#3.2.5",
"name": "https://docs.github.com/en/enterprise-server@3.2/admin/release-notes#3.2.5"
}
]
},
"source": {
"discovery": "EXTERNAL"
}
}

View File

@ -61,6 +61,11 @@
"refsource": "MISC",
"name": "https://www.insyde.com/security-pledge/SA-2022020",
"url": "https://www.insyde.com/security-pledge/SA-2022020"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20220217-0016/",
"url": "https://security.netapp.com/advisory/ntap-20220217-0016/"
}
]
}

View File

@ -61,6 +61,11 @@
"refsource": "MISC",
"name": "https://www.insyde.com/security-pledge/SA-2022018",
"url": "https://www.insyde.com/security-pledge/SA-2022018"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20220217-0014/",
"url": "https://security.netapp.com/advisory/ntap-20220217-0014/"
}
]
}

View File

@ -61,6 +61,11 @@
"refsource": "MISC",
"name": "https://www.insyde.com/security-pledge/SA-2022019",
"url": "https://www.insyde.com/security-pledge/SA-2022019"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20220217-0012/",
"url": "https://security.netapp.com/advisory/ntap-20220217-0012/"
}
]
}

View File

@ -61,6 +61,11 @@
"refsource": "MISC",
"name": "https://www.insyde.com/security-pledge/SA-2022007",
"url": "https://www.insyde.com/security-pledge/SA-2022007"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20220217-0015/",
"url": "https://security.netapp.com/advisory/ntap-20220217-0015/"
}
]
}

View File

@ -56,6 +56,11 @@
"url": "https://www.insyde.com/security-pledge",
"refsource": "MISC",
"name": "https://www.insyde.com/security-pledge"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20220217-0013/",
"url": "https://security.netapp.com/advisory/ntap-20220217-0013/"
}
]
}