Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2023-23763", "assignerOrgId": "82327ea3-741d-41e4-88f8-2cf9e791e760", "state": "PUBLISHED", "assignerShortName": "GitHub_P", "dateReserved": "2023-01-17T20:40:37.553Z", "datePublished": "2023-09-01T14:23:42.930Z", "dateUpdated": "2024-10-01T14:23:19.054Z"}, "containers": {"cna": {"affected": [{"defaultStatus": "unaffected", "product": "Enterprise Server", "vendor": "GitHub", "versions": [{"lessThan": "3.6.18", "status": "affected", "version": "3.6.0", "versionType": "semver"}, {"lessThan": "3.7.16", "status": "affected", "version": "3.7.0", "versionType": "semver"}, {"lessThan": "3.8.9", "status": "affected", "version": "3.8.0", "versionType": "semver"}, {"lessThan": "3.9.4", "status": "affected", "version": "3.9.0", "versionType": "semver"}]}], "credits": [{"lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "inspector-ambitious"}], "descriptions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "An authorization/sensitive information disclosure vulnerability was identified in GitHub Enterprise Server that allowed a fork to <span style=\"background-color: rgba(232, 232, 232, 0.04);\">retain read access to an upstream repository after its visibility was changed to private</span>. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.10.0 and was fixed in versions 3.9.4, 3.8.9, 3.7.16 and 3.6.18. This vulnerability was reported via the GitHub Bug Bounty program.<br>"}], "value": "An authorization/sensitive information disclosure vulnerability was identified in GitHub Enterprise Server that allowed a fork to retain read access to an upstream repository after its visibility was changed to private. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.10.0 and was fixed in versions 3.9.4, 3.8.9, 3.7.16 and 3.6.18. This vulnerability was reported via the GitHub Bug Bounty program.\n"}], "impacts": [{"capecId": "CAPEC-116", "descriptions": [{"lang": "en", "value": "CAPEC-116 Excavation"}]}], "metrics": [{"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1"}, "format": "CVSS", "scenarios": [{"lang": "en", "value": "GENERAL"}]}], "problemTypes": [{"descriptions": [{"cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"orgId": "82327ea3-741d-41e4-88f8-2cf9e791e760", "shortName": "GitHub_P", "dateUpdated": "2023-09-01T14:54:47.228Z"}, "references": [{"url": "https://docs.github.com/en/enterprise-server@3.6/admin/release-notes#3.6.18-security-fixes"}, {"url": "https://docs.github.com/en/enterprise-server@3.7/admin/release-notes#3.7.16-security-fixes"}, {"url": "https://docs.github.com/en/enterprise-server@3.8/admin/release-notes#3.8.9-security-fixes"}, {"url": "https://docs.github.com/en/enterprise-server@3.9/admin/release-notes#3.9.4-security-fixes"}], "source": {"discovery": "EXTERNAL"}, "title": "Information disclosure in GitHub Enterprise Server leading to private repository leakage", "x_generator": {"engine": "Vulnogram 0.1.0-dev"}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-02T10:42:25.864Z"}, "title": "CVE Program Container", "references": [{"url": "https://docs.github.com/en/enterprise-server@3.6/admin/release-notes#3.6.18-security-fixes", "tags": ["x_transferred"]}, {"url": "https://docs.github.com/en/enterprise-server@3.7/admin/release-notes#3.7.16-security-fixes", "tags": ["x_transferred"]}, {"url": "https://docs.github.com/en/enterprise-server@3.8/admin/release-notes#3.8.9-security-fixes", "tags": ["x_transferred"]}, {"url": "https://docs.github.com/en/enterprise-server@3.9/admin/release-notes#3.9.4-security-fixes", "tags": ["x_transferred"]}]}, {"metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2024-10-01T14:23:08.297111Z", "id": "CVE-2023-23763", "options": [{"Exploitation": "none"}, {"Automatable": "yes"}, {"Technical Impact": "partial"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-10-01T14:23:19.054Z"}}]}}