"-Synchronized-Data."

This commit is contained in:
CVE Team 2021-11-10 02:01:09 +00:00
parent 47488839c1
commit 1609b4dcdf
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743

View File

@ -1,91 +1,94 @@
{
"CVE_data_meta": {
"ASSIGNER": "product-cna@github.com",
"ID": "CVE-2021-22870",
"STATE": "PUBLIC",
"TITLE": "Path traversal in GitHub Enterprise Server hosted Pages leads to unauthorized file read access"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "GitHub Enterprise Server",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "3.0",
"version_value": "3.0.19"
"CVE_data_meta": {
"ASSIGNER": "product-cna@github.com",
"ID": "CVE-2021-22870",
"STATE": "PUBLIC",
"TITLE": "Path traversal in GitHub Enterprise Server hosted Pages leads to unauthorized file read access"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "GitHub Enterprise Server",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "3.0",
"version_value": "3.0.19"
},
{
"version_affected": "<",
"version_name": "3.1",
"version_value": "3.1.11"
},
{
"version_affected": "<",
"version_name": "3.2",
"version_value": "3.2.3"
}
]
}
}
]
},
{
"version_affected": "<",
"version_name": "3.1",
"version_value": "3.1.11"
},
{
"version_affected": "<",
"version_name": "3.2",
"version_value": "3.2.3"
}
]
"vendor_name": "GitHub"
}
}
]
},
"vendor_name": "GitHub"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "yvvdwf"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A path traversal vulnerability was identified in GitHub Pages builds on GitHub Enterprise Server that could allow an attacker to read system files. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.3 and was fixed in versions 3.0.19, 3.1.11, and 3.2.3. This vulnerability was reported via the GitHub Bug Bounty program."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
},
"credit": [
{
"lang": "eng",
"value": "CWE-23"
}
"value": "yvvdwf"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A path traversal vulnerability was identified in GitHub Pages builds on GitHub Enterprise Server that could allow an attacker to read system files. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.3 and was fixed in versions 3.0.19, 3.1.11, and 3.2.3. This vulnerability was reported via the GitHub Bug Bounty program."
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://docs.github.com/en/enterprise-server@3.0/admin/release-notes#3.0.19"
},
{
"refsource": "CONFIRM",
"url": "https://docs.github.com/en/enterprise-server@3.1/admin/release-notes#3.1.11"
},
{
"refsource": "CONFIRM",
"url": "https://docs.github.com/en/enterprise-server@3.2/admin/release-notes#3.2.3"
}
]
},
"source": {
"discovery": "EXTERNAL"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-23"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://docs.github.com/en/enterprise-server@3.0/admin/release-notes#3.0.19",
"name": "https://docs.github.com/en/enterprise-server@3.0/admin/release-notes#3.0.19"
},
{
"refsource": "MISC",
"url": "https://docs.github.com/en/enterprise-server@3.1/admin/release-notes#3.1.11",
"name": "https://docs.github.com/en/enterprise-server@3.1/admin/release-notes#3.1.11"
},
{
"refsource": "MISC",
"url": "https://docs.github.com/en/enterprise-server@3.2/admin/release-notes#3.2.3",
"name": "https://docs.github.com/en/enterprise-server@3.2/admin/release-notes#3.2.3"
}
]
},
"source": {
"discovery": "EXTERNAL"
}
}