{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-46648","assignerOrgId":"82327ea3-741d-41e4-88f8-2cf9e791e760","state":"PUBLISHED","assignerShortName":"GitHub_P","dateReserved":"2023-10-24T13:41:13.390Z","datePublished":"2023-12-21T20:45:45.845Z","dateUpdated":"2024-08-02T20:53:20.919Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Enterprise Server","vendor":"GitHub","versions":[{"lessThan":"3.8.12","status":"affected","version":"3.8.0","versionType":"semver"},{"lessThan":"3.9.7","status":"affected","version":"3.9.0","versionType":"semver"},{"lessThan":"3.10.4","status":"affected","version":"3.10.0","versionType":"semver"},{"lessThan":"3.11.1","status":"affected","version":"3.11.0","versionType":"semver"}]}],"credits":[{"lang":"en","type":"finder","user":"00000000-0000-4000-9000-000000000000","value":"Imre Rad"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"An insufficient entropy vulnerability was identified in GitHub Enterprise Server (GHES) that allowed an attacker to brute force a user invitation to the GHES Management Console. To exploit this vulnerability, an attacker would need knowledge that a user invitation was pending. This vulnerability affected all versions of GitHub Enterprise Server since 3.8 and was fixed in version 3.8.12, 3.9.7, 3.10.4, and 3.11.1. This vulnerability was reported via the GitHub Bug Bounty program.<br>"}],"value":"An insufficient entropy vulnerability was identified in GitHub Enterprise Server (GHES) that allowed an attacker to brute force a user invitation to the GHES Management Console. To exploit this vulnerability, an attacker would need knowledge that a user invitation was pending. This vulnerability affected all versions of GitHub Enterprise Server since 3.8 and was fixed in version 3.8.12, 3.9.7, 3.10.4, and 3.11.1. This vulnerability was reported via the GitHub Bug Bounty program.\n"}],"impacts":[{"capecId":"CAPEC-112","descriptions":[{"lang":"en","value":"CAPEC-112 Brute Force"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8.3,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-331","description":"CWE-331 Insufficient Entropy","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"82327ea3-741d-41e4-88f8-2cf9e791e760","shortName":"GitHub_P","dateUpdated":"2023-12-21T20:45:45.845Z"},"references":[{"url":"https://docs.github.com/en/enterprise-server@3.8/admin/release-notes#3.8.12"},{"url":"https://docs.github.com/en/enterprise-server@3.9/admin/release-notes#3.9.7"},{"url":"https://docs.github.com/en/enterprise-server@3.10/admin/release-notes#3.10.4"},{"url":"https://docs.github.com/en/enterprise-server@3.11/admin/release-notes#3.11.1"}],"source":{"discovery":"EXTERNAL"},"title":"Insufficient Entropy in GitHub Enterprise Server Management Console Invitation Token","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T20:53:20.919Z"},"title":"CVE Program Container","references":[{"url":"https://docs.github.com/en/enterprise-server@3.8/admin/release-notes#3.8.12","tags":["x_transferred"]},{"url":"https://docs.github.com/en/enterprise-server@3.9/admin/release-notes#3.9.7","tags":["x_transferred"]},{"url":"https://docs.github.com/en/enterprise-server@3.10/admin/release-notes#3.10.4","tags":["x_transferred"]},{"url":"https://docs.github.com/en/enterprise-server@3.11/admin/release-notes#3.11.1","tags":["x_transferred"]}]}]}}