GitHub Enterprise Cloud (“github.com”) vulnerabilities response: patched and not vulnerable

GitHub.com and supporting services are not vulnerable. Patches and mitigations were applied as necessary ahead of the public vulnerability disclosure. Standard incident response procedures were enacted to ensure no earlier attempts were made to exploit the vulnerabilities.

Common Vulnerability and Exposure (CVE) references have been issued for the vulnerabilities:

  • CRITICAL: A specially crafted request could allow arbitrary files to be read and the file content to be disclosed. For more information, see the associated Rails CVE: CVE-2019-5418
  • HIGH: High CPU usage could be triggered by a specially crafted request resulting in Denial of Service (DoS). For more information see the associated Rails CVE: CVE-2019-5419

Pull request file filter selections are reflected in URLs, and files are collapsed/expanded instead of shown/hidden.

Learn more about filtering files in a pull request by file type

See more