CVE-2022-23740: CWE-88 in GitHub GitHub Enterprise Server
CRITICAL: An improper neutralization of argument delimiters in a command vulnerability was identified in GitHub Enterprise Server that enabled remote code execution. To exploit this vulnerability, an attacker would need permission to create and build GitHub Pages using GitHub Actions. This vulnerability affected only version 3.7.0 of GitHub Enterprise Server and was fixed in version 3.7.1. This vulnerability was reported via the GitHub Bug Bounty program.
AI Analysis
Technical Summary
CVE-2022-23740 is a critical vulnerability identified in GitHub Enterprise Server version 3.7.0, classified under CWE-88 (Improper Neutralization of Argument Delimiters in a Command). This vulnerability allows remote code execution (RCE) due to improper sanitization of command arguments, enabling an attacker to inject and execute arbitrary commands on the affected server. The exploit requires that the attacker has permission to create and build GitHub Pages using GitHub Actions, which means the attacker must have at least limited privileges within the GitHub Enterprise environment. The vulnerability was addressed and fixed in version 3.7.1 of GitHub Enterprise Server. The CVSS v3.1 base score is 8.8, indicating a high severity level, with the vector string AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H. This means the attack can be performed remotely over the network with low attack complexity, requires low privileges, and no user interaction. The impact affects confidentiality, integrity, and availability, as the attacker can execute arbitrary code remotely, potentially leading to full system compromise. No known exploits in the wild have been reported to date. The vulnerability was responsibly disclosed through the GitHub Bug Bounty program. Given the nature of GitHub Enterprise Server as a platform for hosting private repositories and CI/CD pipelines, exploitation could lead to unauthorized access to sensitive source code, injection of malicious code into software builds, and disruption of development workflows.
Potential Impact
For European organizations using GitHub Enterprise Server version 3.7.0, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized remote code execution on critical infrastructure hosting source code and build pipelines. This could result in theft or tampering of intellectual property, insertion of backdoors or malware into software releases, and disruption of software development and deployment processes. Organizations in sectors with high reliance on software integrity, such as finance, telecommunications, healthcare, and government, could face severe operational and reputational damage. Additionally, compromised GitHub Enterprise Servers could be used as pivot points for lateral movement within corporate networks, increasing the risk of broader network compromise. The requirement for low privileges to exploit means that insider threats or compromised user accounts with minimal permissions could trigger a full system compromise. The absence of known exploits in the wild reduces immediate risk but does not eliminate it, especially if attackers develop exploits targeting this vulnerability.
Mitigation Recommendations
1. Immediate upgrade: Organizations should upgrade GitHub Enterprise Server from version 3.7.0 to 3.7.1 or later to apply the official patch that fixes this vulnerability. 2. Access control review: Restrict and audit permissions related to GitHub Pages creation and GitHub Actions workflows, ensuring only trusted users have these capabilities. 3. Monitoring and logging: Enable detailed logging of GitHub Actions executions and repository changes to detect suspicious activity indicative of exploitation attempts. 4. Network segmentation: Isolate GitHub Enterprise Server instances within secure network zones with strict ingress and egress controls to limit exposure. 5. Incident response preparedness: Develop and test incident response plans specific to source code repository compromise scenarios. 6. User training: Educate developers and administrators about the risks of privilege misuse and the importance of applying patches promptly. 7. Vulnerability scanning: Incorporate automated scanning for outdated GitHub Enterprise Server versions in asset management and vulnerability management programs. These steps go beyond generic advice by focusing on permissions related to GitHub Pages and Actions, emphasizing monitoring of build workflows, and network-level protections tailored to GitHub Enterprise Server deployments.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Italy, Spain
CVE-2022-23740: CWE-88 in GitHub GitHub Enterprise Server
Description
CRITICAL: An improper neutralization of argument delimiters in a command vulnerability was identified in GitHub Enterprise Server that enabled remote code execution. To exploit this vulnerability, an attacker would need permission to create and build GitHub Pages using GitHub Actions. This vulnerability affected only version 3.7.0 of GitHub Enterprise Server and was fixed in version 3.7.1. This vulnerability was reported via the GitHub Bug Bounty program.
AI-Powered Analysis
Technical Analysis
CVE-2022-23740 is a critical vulnerability identified in GitHub Enterprise Server version 3.7.0, classified under CWE-88 (Improper Neutralization of Argument Delimiters in a Command). This vulnerability allows remote code execution (RCE) due to improper sanitization of command arguments, enabling an attacker to inject and execute arbitrary commands on the affected server. The exploit requires that the attacker has permission to create and build GitHub Pages using GitHub Actions, which means the attacker must have at least limited privileges within the GitHub Enterprise environment. The vulnerability was addressed and fixed in version 3.7.1 of GitHub Enterprise Server. The CVSS v3.1 base score is 8.8, indicating a high severity level, with the vector string AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H. This means the attack can be performed remotely over the network with low attack complexity, requires low privileges, and no user interaction. The impact affects confidentiality, integrity, and availability, as the attacker can execute arbitrary code remotely, potentially leading to full system compromise. No known exploits in the wild have been reported to date. The vulnerability was responsibly disclosed through the GitHub Bug Bounty program. Given the nature of GitHub Enterprise Server as a platform for hosting private repositories and CI/CD pipelines, exploitation could lead to unauthorized access to sensitive source code, injection of malicious code into software builds, and disruption of development workflows.
Potential Impact
For European organizations using GitHub Enterprise Server version 3.7.0, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized remote code execution on critical infrastructure hosting source code and build pipelines. This could result in theft or tampering of intellectual property, insertion of backdoors or malware into software releases, and disruption of software development and deployment processes. Organizations in sectors with high reliance on software integrity, such as finance, telecommunications, healthcare, and government, could face severe operational and reputational damage. Additionally, compromised GitHub Enterprise Servers could be used as pivot points for lateral movement within corporate networks, increasing the risk of broader network compromise. The requirement for low privileges to exploit means that insider threats or compromised user accounts with minimal permissions could trigger a full system compromise. The absence of known exploits in the wild reduces immediate risk but does not eliminate it, especially if attackers develop exploits targeting this vulnerability.
Mitigation Recommendations
1. Immediate upgrade: Organizations should upgrade GitHub Enterprise Server from version 3.7.0 to 3.7.1 or later to apply the official patch that fixes this vulnerability. 2. Access control review: Restrict and audit permissions related to GitHub Pages creation and GitHub Actions workflows, ensuring only trusted users have these capabilities. 3. Monitoring and logging: Enable detailed logging of GitHub Actions executions and repository changes to detect suspicious activity indicative of exploitation attempts. 4. Network segmentation: Isolate GitHub Enterprise Server instances within secure network zones with strict ingress and egress controls to limit exposure. 5. Incident response preparedness: Develop and test incident response plans specific to source code repository compromise scenarios. 6. User training: Educate developers and administrators about the risks of privilege misuse and the importance of applying patches promptly. 7. Vulnerability scanning: Incorporate automated scanning for outdated GitHub Enterprise Server versions in asset management and vulnerability management programs. These steps go beyond generic advice by focusing on permissions related to GitHub Pages and Actions, emphasizing monitoring of build workflows, and network-level protections tailored to GitHub Enterprise Server deployments.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_P
- Date Reserved
- 2022-01-19T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d983dc4522896dcbef8e4
Added to database: 5/21/2025, 9:09:17 AM
Last enriched: 6/22/2025, 6:52:43 AM
Last updated: 8/17/2025, 6:46:07 AM
Views: 15
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.