CVE-2022-23738: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in GitHub GitHub Enterprise Server
An improper cache key vulnerability was identified in GitHub Enterprise Server that allowed an unauthorized actor to access private repository files through a public repository. To exploit this, an actor would need to already be authorized on the GitHub Enterprise Server instance, be able to create a public repository, and have a site administrator visit a specially crafted URL. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.6 and was fixed in versions 3.2.20, 3.3.15, 3.4.10, 3.5.7, 3.6.3. This vulnerability was reported via the GitHub Bug Bounty program.
AI Analysis
Technical Summary
CVE-2022-23738 is a medium-severity vulnerability affecting GitHub Enterprise Server versions prior to 3.6. It arises from an improper cache key implementation that allows unauthorized exposure of sensitive information. Specifically, an attacker who is already authorized on the GitHub Enterprise Server instance and capable of creating a public repository can exploit this flaw. The attack requires the site administrator to visit a specially crafted URL, which triggers the vulnerability and results in unauthorized access to private repository files through a public repository. This vulnerability is classified under CWE-200, indicating exposure of sensitive information to unauthorized actors. The flaw does not allow modification or deletion of data (integrity is not impacted), nor does it affect availability, but it compromises confidentiality by leaking private repository contents. The vulnerability was fixed in GitHub Enterprise Server versions 3.2.20, 3.3.15, 3.4.10, 3.5.7, and 3.6.3. Exploitation requires low attack complexity (AC:L), network access (AV:N), and privileges (PR:L) but also requires user interaction (UI:R) from a site administrator. No known exploits are currently reported in the wild, and the vulnerability was responsibly disclosed via the GitHub Bug Bounty program.
Potential Impact
For European organizations using GitHub Enterprise Server, this vulnerability poses a significant confidentiality risk. Private repositories often contain sensitive intellectual property, proprietary code, or confidential business information. Unauthorized exposure could lead to intellectual property theft, competitive disadvantage, or regulatory compliance violations, especially under GDPR where data protection is stringent. Since exploitation requires an authorized user with repository creation rights and a site administrator's interaction, insider threats or compromised accounts could leverage this vulnerability. The impact is particularly critical for organizations with strict data governance and those in regulated sectors such as finance, healthcare, and government. Although availability and integrity are not affected, the breach of confidentiality alone can cause reputational damage and financial loss. The absence of known active exploits reduces immediate risk but does not eliminate the potential for targeted attacks.
Mitigation Recommendations
European organizations should immediately verify their GitHub Enterprise Server version and upgrade to the patched releases (3.2.20, 3.3.15, 3.4.10, 3.5.7, or 3.6.3) to remediate this vulnerability. Additionally, organizations should audit user permissions to ensure that only trusted personnel have repository creation rights and site administrator privileges. Implement strict access controls and monitor for unusual activities, such as unexpected public repository creations or suspicious URL visits by administrators. Employ multi-factor authentication (MFA) for all privileged accounts to reduce the risk of account compromise. Conduct regular security awareness training to educate administrators about phishing and social engineering risks that could lead to visiting malicious URLs. Finally, review and enhance logging and alerting mechanisms to detect exploitation attempts promptly.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2022-23738: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in GitHub GitHub Enterprise Server
Description
An improper cache key vulnerability was identified in GitHub Enterprise Server that allowed an unauthorized actor to access private repository files through a public repository. To exploit this, an actor would need to already be authorized on the GitHub Enterprise Server instance, be able to create a public repository, and have a site administrator visit a specially crafted URL. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.6 and was fixed in versions 3.2.20, 3.3.15, 3.4.10, 3.5.7, 3.6.3. This vulnerability was reported via the GitHub Bug Bounty program.
AI-Powered Analysis
Technical Analysis
CVE-2022-23738 is a medium-severity vulnerability affecting GitHub Enterprise Server versions prior to 3.6. It arises from an improper cache key implementation that allows unauthorized exposure of sensitive information. Specifically, an attacker who is already authorized on the GitHub Enterprise Server instance and capable of creating a public repository can exploit this flaw. The attack requires the site administrator to visit a specially crafted URL, which triggers the vulnerability and results in unauthorized access to private repository files through a public repository. This vulnerability is classified under CWE-200, indicating exposure of sensitive information to unauthorized actors. The flaw does not allow modification or deletion of data (integrity is not impacted), nor does it affect availability, but it compromises confidentiality by leaking private repository contents. The vulnerability was fixed in GitHub Enterprise Server versions 3.2.20, 3.3.15, 3.4.10, 3.5.7, and 3.6.3. Exploitation requires low attack complexity (AC:L), network access (AV:N), and privileges (PR:L) but also requires user interaction (UI:R) from a site administrator. No known exploits are currently reported in the wild, and the vulnerability was responsibly disclosed via the GitHub Bug Bounty program.
Potential Impact
For European organizations using GitHub Enterprise Server, this vulnerability poses a significant confidentiality risk. Private repositories often contain sensitive intellectual property, proprietary code, or confidential business information. Unauthorized exposure could lead to intellectual property theft, competitive disadvantage, or regulatory compliance violations, especially under GDPR where data protection is stringent. Since exploitation requires an authorized user with repository creation rights and a site administrator's interaction, insider threats or compromised accounts could leverage this vulnerability. The impact is particularly critical for organizations with strict data governance and those in regulated sectors such as finance, healthcare, and government. Although availability and integrity are not affected, the breach of confidentiality alone can cause reputational damage and financial loss. The absence of known active exploits reduces immediate risk but does not eliminate the potential for targeted attacks.
Mitigation Recommendations
European organizations should immediately verify their GitHub Enterprise Server version and upgrade to the patched releases (3.2.20, 3.3.15, 3.4.10, 3.5.7, or 3.6.3) to remediate this vulnerability. Additionally, organizations should audit user permissions to ensure that only trusted personnel have repository creation rights and site administrator privileges. Implement strict access controls and monitor for unusual activities, such as unexpected public repository creations or suspicious URL visits by administrators. Employ multi-factor authentication (MFA) for all privileged accounts to reduce the risk of account compromise. Conduct regular security awareness training to educate administrators about phishing and social engineering risks that could lead to visiting malicious URLs. Finally, review and enhance logging and alerting mechanisms to detect exploitation attempts promptly.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_P
- Date Reserved
- 2022-01-19T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981cc4522896dcbda738
Added to database: 5/21/2025, 9:08:44 AM
Last enriched: 7/5/2025, 6:42:46 PM
Last updated: 8/8/2025, 2:12:44 AM
Views: 14
Related Threats
CVE-2025-8293: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Theerawat Patthawee Intl DateTime Calendar
MediumCVE-2025-7686: CWE-352 Cross-Site Request Forgery (CSRF) in lmyoaoa weichuncai(WP伪春菜)
MediumCVE-2025-7684: CWE-352 Cross-Site Request Forgery (CSRF) in remysharp Last.fm Recent Album Artwork
MediumCVE-2025-7683: CWE-352 Cross-Site Request Forgery (CSRF) in janyksteenbeek LatestCheckins
MediumCVE-2025-7668: CWE-352 Cross-Site Request Forgery (CSRF) in timothyja Linux Promotional Plugin
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.