An improper access control vulnerability was identified in GitHub Enterprise Server that allowed an authenticated user with the ability to fork a repository to disclose Actions secrets for the parent repository of the fork. This vulnerability existed due to a flaw that allowed the base reference of a pull request to be updated to point to an arbitrary SHA or another pull request outside of the fork repository. By establishing this incorrect reference in a PR, the restrictions that limit the Actions secrets sent a workflow from forks could be bypassed. This vulnerability affected GitHub Enterprise Server version 3.0.0, 3.0.0.rc2, and 3.0.0.rc1. This vulnerability was reported via the GitHub Bug Bounty program.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: GitHub_P
Published: 2021-03-03T03:25:22
Updated: 2024-08-03T18:51:07.479Z
Reserved: 2021-01-06T00:00:00
Link: CVE-2021-22862
Vulnrichment
No data.
NVD
Status : Modified
Published: 2021-03-03T04:15:13.163
Modified: 2024-11-21T05:50:47.250
Link: CVE-2021-22862
Redhat
No data.