Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2020-10516


An improper access control vulnerability was identified in the GitHub Enterprise Server API that allowed an organization member to escalate permissions and gain access to unauthorized repositories within an organization. This vulnerability affected all versions of GitHub Enterprise Server prior to 2.21 and was fixed in 2.20.9, 2.19.15, and 2.18.20. This vulnerability was reported via the GitHub Bug Bounty program.


Published

2020-06-03T14:15:12.377

Last Modified

2024-11-21T04:55:31.120

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 9.8 (CRITICAL)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

10.0

Impact Score

6.4

Weaknesses
  • Type: Secondary
    CWE-285
  • Type: Primary
    CWE-552

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application github github < 2.18.20 Yes
Application github github < 2.19.15 Yes
Application github github < 2.20.9 Yes

References