CVE-2023-46647

8.0 HIGH

📋 TL;DR

This vulnerability allows users with authorized access to the management console with an editor role in GitHub Enterprise Server to escalate their privileges by exploiting an endpoint used for bootstrapping the instance. It affects all versions from 3.8.0 and above, potentially enabling unauthorized administrative access. Organizations running vulnerable versions are at risk of insider threats or compromised accounts.

💻 Affected Systems

Products:
  • GitHub Enterprise Server
Versions: 3.8.0 and above, up to but not including fixed versions
Operating Systems: All supported OS for GitHub Enterprise Server
Default Config Vulnerable: ⚠️ Yes
Notes: Affects instances with management console access enabled and users assigned editor roles; no special configuration required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with editor role access gains full administrative control over the GitHub Enterprise Server instance, allowing them to modify configurations, access sensitive data, or disrupt operations.

🟠

Likely Case

A malicious insider or compromised account with editor privileges escalates to administrator, leading to unauthorized changes or data exposure within the system.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to isolated privilege misuse, quickly detected and contained.

🌐 Internet-Facing: MEDIUM, as exploitation requires authenticated access to the management console, but if exposed to the internet, it increases attack surface from external threats.
🏢 Internal Only: HIGH, as internal users with editor roles can exploit this to gain administrative privileges, posing significant insider risk.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with editor role, making it straightforward for authorized users but not publicly documented.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.8.12, 3.9.6, 3.10.3, or 3.11.0

Vendor Advisory: https://docs.github.com/en/enterprise-server@3.11/admin/release-notes#3.11.0

Restart Required: Yes

Instructions:

1. Backup your instance. 2. Upgrade to a fixed version (e.g., 3.11.0) via the management console or command line. 3. Restart the server as prompted. 4. Verify the upgrade completed successfully.

🔧 Temporary Workarounds

Restrict Management Console Access

all

Limit access to the management console to only trusted administrators, reducing the attack surface for editor role users.

Configure network ACLs or firewall rules to restrict access to the management console IP/port.

🧯 If You Can't Patch

  • Monitor and audit all management console access logs for suspicious activity, especially from editor role users.
  • Implement least privilege principles by reviewing and minimizing editor role assignments to essential personnel only.

🔍 How to Verify

Check if Vulnerable:

Check the GitHub Enterprise Server version via the management console or run: ghe-version

Check Version:

ghe-version

Verify Fix Applied:

After patching, confirm the version is 3.8.12, 3.9.6, 3.10.3, or 3.11.0 using the same command and test editor role access to bootstrap endpoints.

📡 Detection & Monitoring

Log Indicators:

  • Unusual requests to bootstrap-related endpoints from editor role users in management console logs.

Network Indicators:

  • Suspicious HTTP requests to management console bootstrap APIs from internal IPs.

SIEM Query:

source="github-enterprise" AND (endpoint="*bootstrap*" OR action="privilege_escalation") AND user_role="editor"

🔗 References

📤 Share & Export