From a3e88045883eb4245ec7d18660a0055fb9bd91e9 Mon Sep 17 00:00:00 2001 From: Jo Date: Wed, 19 Oct 2022 09:32:52 -0400 Subject: [PATCH] Add CVE-2022-23734 --- 2022/23xxx/CVE-2022-23734.json | 114 ++++++++++++++++++++++++++++----- 1 file changed, 98 insertions(+), 16 deletions(-) diff --git a/2022/23xxx/CVE-2022-23734.json b/2022/23xxx/CVE-2022-23734.json index b48a679d253..b8996285d56 100644 --- a/2022/23xxx/CVE-2022-23734.json +++ b/2022/23xxx/CVE-2022-23734.json @@ -1,18 +1,100 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2022-23734", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "CVE_data_meta": { + "ASSIGNER": "product-cna@github.com", + "ID": "CVE-2022-23734", + "STATE": "PUBLIC", + "TITLE": "Deserialization of Untrusted Data vulnerability in GitHub Enterprise Server leading to Remote Code Execution" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "GitHub Enterprise Server", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "3.2", + "version_value": "3.2.16" + }, + { + "version_affected": "<", + "version_name": "3.3", + "version_value": "3.3.11" + }, + { + "version_affected": "<", + "version_name": "3.4", + "version_value": "3.4.6" + }, + { + "version_affected": "<", + "version_name": "3.5", + "version_value": "3.5.3" + } + ] + } + } + ] + }, + "vendor_name": "GitHub" + } + ] } -} \ No newline at end of file + }, + "credit": [ + { + "lang": "eng", + "value": "Alex Chapman" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A deserialization of untrusted data vulnerability was identified in GitHub Enterprise Server that could potentially lead to remote code execution on the SVNBridge. To exploit this vulnerability, an attacker would need to gain access via a server-side request forgery (SSRF) that would let an attacker control the data being deserialized. This vulnerability affected all versions of GitHub Enterprise Server prior to v3.6 and was fixed in versions 3.5.3, 3.4.6, 3.3.11, and 3.2.16. This vulnerability was reported via the GitHub Bug Bounty program." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-502\tDeserialization of Untrusted Data" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://docs.github.com/en/enterprise-server@3.2/admin/release-notes#3.2.16" + }, + { + "refsource": "CONFIRM", + "url": "https://docs.github.com/en/enterprise-server@3.3/admin/release-notes#3.3.11" + }, + { + "refsource": "CONFIRM", + "url": "https://docs.github.com/en/enterprise-server@3.4/admin/release-notes#3.4.6" + }, + { + "refsource": "CONFIRM", + "url": "https://docs.github.com/en/enterprise-server@3.5/admin/release-notes#3.5.3" + } + ] + }, + "source": { + "discovery": "EXTERNAL" + } +}