Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:github:enterprise_server:3.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "CC0AA188-F17E-4FED-98E9-10CAC3E9797E", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "CRITICAL: An improper neutralization of argument delimiters in a command vulnerability was identified in GitHub Enterprise Server that enabled remote code execution. To exploit this vulnerability, an attacker would need permission to create and build GitHub Pages using GitHub Actions. This vulnerability affected only version 3.7.0 of GitHub Enterprise Server and was fixed in version 3.7.1. This vulnerability was reported via the GitHub Bug Bounty program."}, {"lang": "es", "value": "CR\u00cdTICO: Se identific\u00f3 una neutralizaci\u00f3n incorrecta de los delimitadores de argumentos en una vulnerabilidad de comando en GitHub Enterprise Server que permit\u00eda la ejecuci\u00f3n remota de c\u00f3digo. Para explotar esta vulnerabilidad, un atacante necesitar\u00eda permiso para crear y compilar p\u00e1ginas de GitHub utilizando GitHub Actions. Esta vulnerabilidad afect\u00f3 solo a la versi\u00f3n 3.7.0 de GitHub Enterprise Server y se solucion\u00f3 en la versi\u00f3n 3.7.1. Esta vulnerabilidad se inform\u00f3 a trav\u00e9s del programa GitHub Bug Bounty."}], "id": "CVE-2022-23740", "lastModified": "2025-04-28T15:15:44.577", "metrics": {"cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}, {"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary"}]}, "published": "2022-11-23T18:15:11.130", "references": [{"source": "product-cna@github.com", "url": "https://docs.github.com/en/enterprise-server%403.7/admin/release-notes#3.7.1"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://docs.github.com/en/enterprise-server%403.7/admin/release-notes#3.7.1"}], "sourceIdentifier": "product-cna@github.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-88"}], "source": "product-cna@github.com", "type": "Secondary"}, {"description": [{"lang": "en", "value": "CWE-88"}], "source": "nvd@nist.gov", "type": "Primary"}]}