GitHub Enterprise before 20120304 does not properly restrict the use of a hash to provide values for a model's attributes, which allows remote attackers to set the public_key[user_id] value via a modified URL for the public-key update form, related to a "mass assignment" vulnerability.
The product does not properly restrict reading from or writing to dynamically-managed code resources such as variables, objects, classes, attributes, functions, or executable instructions or statements.
Link | Tags |
---|---|
http://homakov.blogspot.com/2012/03/how-to.html | issue tracking |
http://lwn.net/Articles/488702/ | third party advisory |
https://github.com/blog/1068-public-key-security-vulnerability-and-mitigation | vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/74812 | vdb entry third party advisory |