An authorization/sensitive information disclosure vulnerability was identified in GitHub Enterprise Server that allowed a fork to retain read access to an upstream repository after its visibility was changed to private. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.10.0 and was fixed in versions 3.9.4, 3.8.9, 3.7.16 and 3.6.18. This vulnerability was reported via the GitHub Bug Bounty program.
Metrics
Affected Vendors & Products
References
History
Tue, 01 Oct 2024 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: GitHub_P
Published:
Updated: 2024-10-01T14:23:19.054Z
Reserved: 2023-01-17T20:40:37.553Z
Link: CVE-2023-23763

Updated: 2024-08-02T10:42:25.864Z

Status : Modified
Published: 2023-09-01T15:15:07.620
Modified: 2024-11-21T07:46:47.180
Link: CVE-2023-23763

No data.