An incorrect authorization vulnerability was identified in GitHub Enterprise Server that allowed a repository-scoped token with read/write access to modify Action Workflow files without a Workflow scope. The Create or Update file contents API should enforce workflow scope. This vulnerability affected all versions of GitHub Enterprise Server prior to version 3.7 and was fixed in versions 3.3.16, 3.4.11, 3.5.8, and 3.6.4. This vulnerability was reported via the GitHub Bug Bounty program.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: GitHub_P
Published:
Updated: 2024-08-03T14:31:45.925Z
Reserved: 2022-11-28T00:00:00
Link: CVE-2022-46258

No data.

Status : Modified
Published: 2023-01-09T17:15:10.977
Modified: 2024-11-21T07:30:17.983
Link: CVE-2022-46258

No data.