The 2.13 series release notes contain important changes in this release series.
Arbitrary file content disclosure vulnerability in GitHub Enterprise Server
A CRITICAL issue was identified in Rails that allows an attacker to send a specially crafted request that could allow arbitrary files to be read and the file content to be disclosed.
The affected supported versions are:
- 2.13.0 - 2.13.21
- 2.14.0 - 2.14.15
- 2.15.0 - 2.15.8
- 2.16.0 - 2.16.3
All older, no longer supported versions are also affected.
We strongly urge upgrading your GitHub Enterprise Server appliance to the latest patch release in your series, GitHub Enterprise Server 2.13.22, 2.14.16, 2.15.9, 2.16.4, or greater immediately. If you have any questions, please contact GitHub support at https://enterprise.github.com/support.
- CRITICAL: A specially crafted request could allow arbitrary files to be read and the file content to be disclosed. For more information see the associated Rails CVE: CVE-2019-5418.
- HIGH: High CPU usage could be triggered by a specially crafted request resulting in Denial of Service (DoS). For more information see the associated Rails CVE: CVE-2019-5419.
- Packages have been updated to the latest security versions.
- In rare circumstances, a race condition could lead to repository data loss if an automated background maintenance job was triggered during a configuration update.
- Images uploaded to issues save with an absolute URL, so they can be broken if the hostname changes.
- On a freshly set up GitHub Enterprise without any users, an attacker could create the first admin user.
- Custom firewall rules aren't maintained during an upgrade.
- svn checkout may timeout while the repository data cache is being built. In most cases, subsequent svn checkout attempts will succeed.
- Git LFS tracked files uploaded through the web interface are incorrectly added directly to the repository.
- Pull request review comments are missing from an import with
The GitHub Team