Impact
An improper neutralization of special elements vulnerability allows an authenticated Management Console administrator to inject shell metacharacters into proxy configuration fields, such as the http_proxy setting, and execute arbitrary operating‑system commands. This results in full control of the server, compromising confidentiality, integrity, and availability of the entire GitHub Enterprise Server instance.
Affected Systems
GitHub Enterprise Server versions prior to 3.21 are affected. The issue was addressed in releases 3.20.1, 3.19.5, 3.18.8, 3.17.14, 3.16.17, 3.15.21 and 3.14.26, and the vulnerability is present in all earlier releases.
Risk and Exploitability
The CVSS score of 8.1 reflects a high‑severity flaw. EPSS data is unavailable, but the vulnerability is not listed in CISA's KEV catalog, indicating no known widespread exploitation yet. Successful exploitation requires authenticated, privileged access to the GitHub Enterprise Server Management Console, meaning the attack surface is limited to administrators or compromised admin credentials. Even so, the impact of a successful attack is critical, providing full remote code execution on the server.
OpenCVE Enrichment