An incorrect comparison vulnerability was identified in GitHub Enterprise Server that allowed commit smuggling by displaying an incorrect diff in a re-opened Pull Request. To exploit this vulnerability, an attacker would need write access to the repository. This vulnerability was reported via the GitHub Bug Bounty Program https://bounty.github.com/ .
The product compares two entities in a security-relevant context, but the comparison is incorrect, which may lead to resultant weaknesses.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Enterprise_server | Github | 3.6.0 (including) | 3.6.16 (excluding) |
Enterprise_server | Github | 3.7.0 (including) | 3.7.13 (excluding) |
Enterprise_server | Github | 3.8.0 (including) | 3.8.6 (excluding) |
Enterprise_server | Github | 3.9.0 (including) | 3.9.0 (including) |
This Pillar covers several possibilities: