Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Unsafe configuration options in GitHub Pages leading to path traversal on GitHub Enterprise Server
Vulnerability Description
A path traversal vulnerability was identified in GitHub Enterprise Server that could be exploited when building a GitHub Pages site. User-controlled configuration options used by GitHub Pages were not sufficiently restricted and made it possible to read files on the GitHub Enterprise Server instance. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.1.8 and was fixed in 3.1.8, 3.0.16, and 2.22.22. This vulnerability was reported via the GitHub Bug Bounty program. This is the result of an incomplete fix for CVE-2021-22867.
CVSS Information
N/A
Vulnerability Type
在命令中使用的特殊元素转义处理不恰当(命令注入)
Vulnerability Title
GitHub Enterprise Server 路径遍历漏洞
Vulnerability Description
GitHub Enterprise Server 是 (Github)开源的一个应用软件。提供一个将自己的GitHub实例设置为虚拟设备,从而提供可扩展,易于管理的平台。 GitHub Enterprise Server 存在路径遍历漏洞,该漏洞源于在 GitHub Enterprise Server 中发现了一个路径遍历漏洞,可以在构建GitHub Pages站点时利用该漏洞。GitHub Pages使用的用户控制配置选项没有受到足够的限制,因此可以读取GitHub Enterprise Server实
CVSS Information
N/A
Vulnerability Type
N/A