Skip to main content

CVE-2022-23738: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in GitHub GitHub Enterprise Server

Medium
VulnerabilityCVE-2022-23738cvecve-2022-23738cwe-200
Published: Tue Nov 01 2022 (11/01/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: GitHub
Product: GitHub Enterprise Server

Description

An improper cache key vulnerability was identified in GitHub Enterprise Server that allowed an unauthorized actor to access private repository files through a public repository. To exploit this, an actor would need to already be authorized on the GitHub Enterprise Server instance, be able to create a public repository, and have a site administrator visit a specially crafted URL. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.6 and was fixed in versions 3.2.20, 3.3.15, 3.4.10, 3.5.7, 3.6.3. This vulnerability was reported via the GitHub Bug Bounty program.

AI-Powered Analysis

AILast updated: 07/05/2025, 18:42:46 UTC

Technical Analysis

CVE-2022-23738 is a medium-severity vulnerability affecting GitHub Enterprise Server versions prior to 3.6. It arises from an improper cache key implementation that allows unauthorized exposure of sensitive information. Specifically, an attacker who is already authorized on the GitHub Enterprise Server instance and capable of creating a public repository can exploit this flaw. The attack requires the site administrator to visit a specially crafted URL, which triggers the vulnerability and results in unauthorized access to private repository files through a public repository. This vulnerability is classified under CWE-200, indicating exposure of sensitive information to unauthorized actors. The flaw does not allow modification or deletion of data (integrity is not impacted), nor does it affect availability, but it compromises confidentiality by leaking private repository contents. The vulnerability was fixed in GitHub Enterprise Server versions 3.2.20, 3.3.15, 3.4.10, 3.5.7, and 3.6.3. Exploitation requires low attack complexity (AC:L), network access (AV:N), and privileges (PR:L) but also requires user interaction (UI:R) from a site administrator. No known exploits are currently reported in the wild, and the vulnerability was responsibly disclosed via the GitHub Bug Bounty program.

Potential Impact

For European organizations using GitHub Enterprise Server, this vulnerability poses a significant confidentiality risk. Private repositories often contain sensitive intellectual property, proprietary code, or confidential business information. Unauthorized exposure could lead to intellectual property theft, competitive disadvantage, or regulatory compliance violations, especially under GDPR where data protection is stringent. Since exploitation requires an authorized user with repository creation rights and a site administrator's interaction, insider threats or compromised accounts could leverage this vulnerability. The impact is particularly critical for organizations with strict data governance and those in regulated sectors such as finance, healthcare, and government. Although availability and integrity are not affected, the breach of confidentiality alone can cause reputational damage and financial loss. The absence of known active exploits reduces immediate risk but does not eliminate the potential for targeted attacks.

Mitigation Recommendations

European organizations should immediately verify their GitHub Enterprise Server version and upgrade to the patched releases (3.2.20, 3.3.15, 3.4.10, 3.5.7, or 3.6.3) to remediate this vulnerability. Additionally, organizations should audit user permissions to ensure that only trusted personnel have repository creation rights and site administrator privileges. Implement strict access controls and monitor for unusual activities, such as unexpected public repository creations or suspicious URL visits by administrators. Employ multi-factor authentication (MFA) for all privileged accounts to reduce the risk of account compromise. Conduct regular security awareness training to educate administrators about phishing and social engineering risks that could lead to visiting malicious URLs. Finally, review and enhance logging and alerting mechanisms to detect exploitation attempts promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_P
Date Reserved
2022-01-19T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981cc4522896dcbda738

Added to database: 5/21/2025, 9:08:44 AM

Last enriched: 7/5/2025, 6:42:46 PM

Last updated: 8/8/2025, 2:12:44 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats