mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-05-07 03:02:46 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
773dfd01d9
commit
141d7709c4
@ -1,91 +1,94 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "product-cna@github.com",
|
||||
"ID": "CVE-2021-41599",
|
||||
"STATE": "PUBLIC",
|
||||
"TITLE": "Improper control flow in GitHub Enterprise Server hosted Pages leads to remote code execution"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "GitHub Enterprise Server",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "3.0",
|
||||
"version_value": "3.0.21"
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "product-cna@github.com",
|
||||
"ID": "CVE-2021-41599",
|
||||
"STATE": "PUBLIC",
|
||||
"TITLE": "Improper control flow in GitHub Enterprise Server hosted Pages leads to remote code execution"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "GitHub Enterprise Server",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "3.0",
|
||||
"version_value": "3.0.21"
|
||||
},
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "3.1",
|
||||
"version_value": "3.1.13"
|
||||
},
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "3.2",
|
||||
"version_value": "3.2.5"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "3.1",
|
||||
"version_value": "3.1.13"
|
||||
},
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "3.2",
|
||||
"version_value": "3.2.5"
|
||||
}
|
||||
]
|
||||
"vendor_name": "GitHub"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "GitHub"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"credit": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "yvvdwf"
|
||||
}
|
||||
],
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A remote code execution vulnerability was identified in GitHub Enterprise Server that could be exploited when building a GitHub Pages site. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.3 and was fixed in versions 3.0.21, 3.1.13, 3.2.5. This vulnerability was reported via the GitHub Bug Bounty program."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
},
|
||||
"credit": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "CWE-77, CWE-691, CWE-459"
|
||||
}
|
||||
"value": "yvvdwf"
|
||||
}
|
||||
],
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A remote code execution vulnerability was identified in GitHub Enterprise Server that could be exploited when building a GitHub Pages site. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.3 and was fixed in versions 3.0.21, 3.1.13, 3.2.5. This vulnerability was reported via the GitHub Bug Bounty program."
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://docs.github.com/en/enterprise-server@3.0/admin/release-notes#3.0.21"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://docs.github.com/en/enterprise-server@3.1/admin/release-notes#3.1.13"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://docs.github.com/en/enterprise-server@3.2/admin/release-notes#3.2.5"
|
||||
}
|
||||
]
|
||||
},
|
||||
"source": {
|
||||
"discovery": "EXTERNAL"
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "CWE-77, CWE-691, CWE-459"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"url": "https://docs.github.com/en/enterprise-server@3.0/admin/release-notes#3.0.21",
|
||||
"name": "https://docs.github.com/en/enterprise-server@3.0/admin/release-notes#3.0.21"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"url": "https://docs.github.com/en/enterprise-server@3.1/admin/release-notes#3.1.13",
|
||||
"name": "https://docs.github.com/en/enterprise-server@3.1/admin/release-notes#3.1.13"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"url": "https://docs.github.com/en/enterprise-server@3.2/admin/release-notes#3.2.5",
|
||||
"name": "https://docs.github.com/en/enterprise-server@3.2/admin/release-notes#3.2.5"
|
||||
}
|
||||
]
|
||||
},
|
||||
"source": {
|
||||
"discovery": "EXTERNAL"
|
||||
}
|
||||
}
|
@ -61,6 +61,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.insyde.com/security-pledge/SA-2022020",
|
||||
"url": "https://www.insyde.com/security-pledge/SA-2022020"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20220217-0016/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20220217-0016/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -61,6 +61,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.insyde.com/security-pledge/SA-2022018",
|
||||
"url": "https://www.insyde.com/security-pledge/SA-2022018"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20220217-0014/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20220217-0014/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -61,6 +61,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.insyde.com/security-pledge/SA-2022019",
|
||||
"url": "https://www.insyde.com/security-pledge/SA-2022019"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20220217-0012/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20220217-0012/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -61,6 +61,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.insyde.com/security-pledge/SA-2022007",
|
||||
"url": "https://www.insyde.com/security-pledge/SA-2022007"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20220217-0015/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20220217-0015/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -56,6 +56,11 @@
|
||||
"url": "https://www.insyde.com/security-pledge",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.insyde.com/security-pledge"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20220217-0013/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20220217-0013/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user