CVE-2022-46256: CWE-22 in GitHub GitHub Enterprise Server
A path traversal vulnerability was identified in GitHub Enterprise Server that allowed remote code execution when building a GitHub Pages site. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the instance. This vulnerability was fixed in versions 3.3.17, 3.4.12, 3.5.9, 3.6.5 and 3.7.2. This vulnerability was reported via the GitHub Bug Bounty program.
AI Analysis
Technical Summary
CVE-2022-46256 is a high-severity path traversal vulnerability (CWE-22) affecting GitHub Enterprise Server versions 3.3 through 3.7. This flaw allows an attacker with permission to create and build GitHub Pages sites on the affected instance to execute arbitrary code remotely. The vulnerability arises during the build process of GitHub Pages sites, where improper validation of file paths enables traversal outside the intended directory structure. By exploiting this, an attacker can manipulate file paths to access or overwrite files beyond the build context, ultimately leading to remote code execution on the server hosting the GitHub Enterprise instance. The vulnerability requires the attacker to have at least limited privileges (permission to create and build GitHub Pages sites), but does not require user interaction beyond that. The CVSS v3.1 base score is 8.8, reflecting its network attack vector, low complexity, required privileges, and high impact on confidentiality, integrity, and availability. The issue was responsibly disclosed through the GitHub Bug Bounty program and fixed in versions 3.3.17, 3.4.12, 3.5.9, 3.6.5, and 3.7.2. No known exploits in the wild have been reported to date. The vulnerability is particularly critical because GitHub Enterprise Server is widely used by organizations to host internal code repositories and manage software development workflows, meaning a successful exploit could compromise sensitive source code and disrupt development operations.
Potential Impact
For European organizations, the impact of this vulnerability can be significant. Many enterprises, including government agencies, financial institutions, and large corporations across Europe, rely on GitHub Enterprise Server for secure code hosting and collaboration. Exploitation could lead to unauthorized access to proprietary source code, intellectual property theft, and potential insertion of malicious code into software projects. This could result in supply chain compromises affecting downstream customers and partners. Additionally, remote code execution on the server could allow attackers to disrupt development pipelines, cause denial of service, or pivot to other internal systems, escalating the breach impact. The requirement for build permissions limits the attack surface to insiders or compromised accounts, but insider threats or credential theft remain realistic risks. Given the critical role of software development in digital transformation initiatives in Europe, this vulnerability poses a threat to confidentiality, integrity, and availability of critical IT assets.
Mitigation Recommendations
European organizations should prioritize upgrading GitHub Enterprise Server instances to the patched versions (3.3.17, 3.4.12, 3.5.9, 3.6.5, or 3.7.2) immediately to remediate this vulnerability. Beyond patching, organizations should audit and restrict permissions related to GitHub Pages site creation and builds, ensuring only trusted users have such capabilities. Implement strict access controls and monitor for anomalous build activities that could indicate exploitation attempts. Employ network segmentation to isolate GitHub Enterprise Servers from critical infrastructure to limit lateral movement in case of compromise. Regularly review and rotate credentials, and enforce multi-factor authentication to reduce risk from stolen or compromised accounts. Additionally, enable detailed logging and alerting on repository and build operations to detect suspicious behavior early. Conduct internal security training to raise awareness about the risks associated with build permissions and insider threats. Finally, consider integrating GitHub Enterprise Server with centralized security monitoring and incident response workflows to accelerate detection and remediation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Italy
CVE-2022-46256: CWE-22 in GitHub GitHub Enterprise Server
Description
A path traversal vulnerability was identified in GitHub Enterprise Server that allowed remote code execution when building a GitHub Pages site. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the instance. This vulnerability was fixed in versions 3.3.17, 3.4.12, 3.5.9, 3.6.5 and 3.7.2. This vulnerability was reported via the GitHub Bug Bounty program.
AI-Powered Analysis
Technical Analysis
CVE-2022-46256 is a high-severity path traversal vulnerability (CWE-22) affecting GitHub Enterprise Server versions 3.3 through 3.7. This flaw allows an attacker with permission to create and build GitHub Pages sites on the affected instance to execute arbitrary code remotely. The vulnerability arises during the build process of GitHub Pages sites, where improper validation of file paths enables traversal outside the intended directory structure. By exploiting this, an attacker can manipulate file paths to access or overwrite files beyond the build context, ultimately leading to remote code execution on the server hosting the GitHub Enterprise instance. The vulnerability requires the attacker to have at least limited privileges (permission to create and build GitHub Pages sites), but does not require user interaction beyond that. The CVSS v3.1 base score is 8.8, reflecting its network attack vector, low complexity, required privileges, and high impact on confidentiality, integrity, and availability. The issue was responsibly disclosed through the GitHub Bug Bounty program and fixed in versions 3.3.17, 3.4.12, 3.5.9, 3.6.5, and 3.7.2. No known exploits in the wild have been reported to date. The vulnerability is particularly critical because GitHub Enterprise Server is widely used by organizations to host internal code repositories and manage software development workflows, meaning a successful exploit could compromise sensitive source code and disrupt development operations.
Potential Impact
For European organizations, the impact of this vulnerability can be significant. Many enterprises, including government agencies, financial institutions, and large corporations across Europe, rely on GitHub Enterprise Server for secure code hosting and collaboration. Exploitation could lead to unauthorized access to proprietary source code, intellectual property theft, and potential insertion of malicious code into software projects. This could result in supply chain compromises affecting downstream customers and partners. Additionally, remote code execution on the server could allow attackers to disrupt development pipelines, cause denial of service, or pivot to other internal systems, escalating the breach impact. The requirement for build permissions limits the attack surface to insiders or compromised accounts, but insider threats or credential theft remain realistic risks. Given the critical role of software development in digital transformation initiatives in Europe, this vulnerability poses a threat to confidentiality, integrity, and availability of critical IT assets.
Mitigation Recommendations
European organizations should prioritize upgrading GitHub Enterprise Server instances to the patched versions (3.3.17, 3.4.12, 3.5.9, 3.6.5, or 3.7.2) immediately to remediate this vulnerability. Beyond patching, organizations should audit and restrict permissions related to GitHub Pages site creation and builds, ensuring only trusted users have such capabilities. Implement strict access controls and monitor for anomalous build activities that could indicate exploitation attempts. Employ network segmentation to isolate GitHub Enterprise Servers from critical infrastructure to limit lateral movement in case of compromise. Regularly review and rotate credentials, and enforce multi-factor authentication to reduce risk from stolen or compromised accounts. Additionally, enable detailed logging and alerting on repository and build operations to detect suspicious behavior early. Conduct internal security training to raise awareness about the risks associated with build permissions and insider threats. Finally, consider integrating GitHub Enterprise Server with centralized security monitoring and incident response workflows to accelerate detection and remediation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_P
- Date Reserved
- 2022-11-28T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9849c4522896dcbf6efa
Added to database: 5/21/2025, 9:09:29 AM
Last enriched: 6/21/2025, 3:24:06 PM
Last updated: 8/4/2025, 4:23:29 AM
Views: 12
Related Threats
CVE-2025-41242: Vulnerability in VMware Spring Framework
MediumCVE-2025-47206: CWE-787 in QNAP Systems Inc. File Station 5
HighCVE-2025-5296: CWE-59 Improper Link Resolution Before File Access ('Link Following') in Schneider Electric SESU
HighCVE-2025-6625: CWE-20 Improper Input Validation in Schneider Electric Modicon M340
HighCVE-2025-57703: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Delta Electronics DIAEnergie
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.