{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-46258","assignerOrgId":"82327ea3-741d-41e4-88f8-2cf9e791e760","assignerShortName":"GitHub_P","dateUpdated":"2025-04-09T13:51:10.568Z","dateReserved":"2022-11-28T00:00:00.000Z","datePublished":"2023-01-09T00:00:00.000Z"},"containers":{"cna":{"title":"Incorrect Authorization in GitHub Enterprise Server leads to Action Workflow modifications without Workflow Scope","providerMetadata":{"orgId":"82327ea3-741d-41e4-88f8-2cf9e791e760","shortName":"GitHub_P","dateUpdated":"2023-01-30T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"An incorrect authorization vulnerability was identified in GitHub Enterprise Server that allowed a repository-scoped token with read/write access to modify Action Workflow files without a Workflow scope. The Create or Update file contents API should enforce workflow scope. This vulnerability affected all versions of GitHub Enterprise Server prior to version 3.7 and was fixed in versions 3.3.16, 3.4.11, 3.5.8, and 3.6.4. This vulnerability was reported via the GitHub Bug Bounty program."}],"affected":[{"vendor":"GitHub","product":"GitHub Enterprise Server","versions":[{"version":"3.3","status":"affected","lessThan":"3.3.16","versionType":"custom"},{"version":"3.4","status":"affected","lessThan":"3.4.11","versionType":"custom"},{"version":"3.5","status":"affected","lessThan":"3.5.8","versionType":"custom"},{"version":"3.6","status":"affected","lessThan":"3.6.4","versionType":"custom"}]}],"references":[{"url":"https://docs.github.com/en/enterprise-server%403.3/admin/release-notes#3.3.16"},{"url":"https://docs.github.com/en/enterprise-server%403.4/admin/release-notes#3.4.11"},{"url":"https://docs.github.com/en/enterprise-server%403.5/admin/release-notes#3.5.8"},{"url":"https://docs.github.com/en/enterprise-server%403.6/admin/release-notes#3.6.4"}],"credits":[{"lang":"en","value":"Alex Ilgayev"},{"lang":"en","value":"Vaibhav Singh (@vaib25vicky)"}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-863","cweId":"CWE-863"}]}],"source":{"discovery":"EXTERNAL"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T14:31:45.925Z"},"title":"CVE Program Container","references":[{"url":"https://docs.github.com/en/enterprise-server%403.3/admin/release-notes#3.3.16","tags":["x_transferred"]},{"url":"https://docs.github.com/en/enterprise-server%403.4/admin/release-notes#3.4.11","tags":["x_transferred"]},{"url":"https://docs.github.com/en/enterprise-server%403.5/admin/release-notes#3.5.8","tags":["x_transferred"]},{"url":"https://docs.github.com/en/enterprise-server%403.6/admin/release-notes#3.6.4","tags":["x_transferred"]}]},{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":6.5,"attackVector":"NETWORK","baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"NONE","privilegesRequired":"LOW","confidentialityImpact":"NONE"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-04-09T13:49:39.279825Z","id":"CVE-2022-46258","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-09T13:51:10.568Z"}}]}}