Skip to main content

CVE-2025-48064: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in desktop desktop

Low
VulnerabilityCVE-2025-48064cvecve-2025-48064cwe-200
Published: Wed May 21 2025 (05/21/2025, 17:40:57 UTC)
Source: CVE
Vendor/Project: desktop
Product: desktop

Description

GitHub Desktop is an open-source, Electron-based GitHub app designed for git development. Prior to version 3.4.20-beta3, an attacker convincing a user to view a file in a commit of their making in the history view can cause information disclosure by means of Git attempting to access a network share. This affects GitHub Desktop users on Windows that view malicious commits in the history view. macOS users are not affected. When viewing a file diff in the history view GitHub Desktop will call `git log` or `git diff` with the object id (SHA) of the commit, the name of the file, and the old name of the file if the file has been renamed. As a security precaution Git will attempt to fully resolve the old and new path via `realpath`, traversing symlinks, to ensure that the resolved paths reside within the repository working directory. This can lead to Git attempting to access a path that resides on a network share (UNC path) and in doing so Windows will attempt to perform NTLM authentication which passes information such as the computer name, the currently signed in (Windows) user name, and an NTLM hash. GitHub Desktop 3.4.20 and later fix this vulnerability. The beta channel includes the fix in 3.4.20-beta3. As a workaround to use until upgrading is possible, only browse commits in the history view that comes from trusted sources.

AI-Powered Analysis

AILast updated: 07/07/2025, 13:41:36 UTC

Technical Analysis

CVE-2025-48064 is a vulnerability affecting GitHub Desktop, an open-source Electron-based application used for Git version control operations. The flaw exists in versions prior to 3.4.20-beta3 on Windows platforms. When a user views a file in a commit within the history view, GitHub Desktop internally calls Git commands such as `git log` or `git diff` with commit object IDs and file names. As part of its operation, Git attempts to resolve file paths fully using `realpath`, which traverses symbolic links to ensure paths remain within the repository directory. However, if a malicious commit contains file paths that resolve to network shares (UNC paths), Git will attempt to access these shares. On Windows, this triggers an automatic NTLM authentication attempt, leaking sensitive information including the computer name, the logged-in Windows username, and an NTLM hash. This exposure occurs without requiring elevated privileges but does require user interaction (viewing the malicious commit). macOS users are not affected due to differences in path resolution and authentication mechanisms. The vulnerability is classified as CWE-200 (Exposure of Sensitive Information) and has a CVSS v3.1 score of 3.3 (low severity). The issue is fixed in GitHub Desktop version 3.4.20 and later, including the beta 3.4.20-beta3. Until patched, users are advised to only browse commits from trusted sources to avoid triggering the vulnerability. No known exploits are currently reported in the wild.

Potential Impact

For European organizations, this vulnerability poses a limited but non-negligible risk. The exposure of NTLM hashes and user/computer names could facilitate further lateral movement or credential replay attacks within corporate networks if an attacker can trick users into viewing malicious commits. While the initial impact is information disclosure only, leaked NTLM hashes can be used in relay or brute-force attacks to escalate privileges or access sensitive resources. Organizations with Windows-based developers using GitHub Desktop are at risk, especially if they handle code from untrusted or external contributors. The risk is mitigated by the low CVSS score and requirement for user interaction, but targeted attacks against software development teams or supply chain compromise scenarios could leverage this vulnerability to gain footholds in networks. The vulnerability does not affect macOS users, reducing the overall impact in mixed-OS environments. Since no known exploits are reported, the immediate threat level is low, but the potential for credential exposure warrants prompt remediation in sensitive environments.

Mitigation Recommendations

1. Upgrade GitHub Desktop to version 3.4.20 or later as soon as possible to apply the official fix. 2. Until upgrading, restrict developers from viewing commits from untrusted or unknown sources in the history view to avoid triggering the vulnerability. 3. Implement network segmentation and monitoring to detect unusual NTLM authentication attempts or SMB traffic from developer workstations. 4. Enforce the use of multi-factor authentication (MFA) and strong credential policies to reduce the risk from leaked NTLM hashes. 5. Educate development teams about the risks of opening commits from unknown contributors and encourage verification of code sources. 6. Consider disabling automatic network share access or NTLM authentication on developer machines if feasible, using Group Policy or local security policies. 7. Monitor logs for suspicious authentication attempts that may indicate exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-05-15T16:06:40.941Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682e12f6c4522896dcc6934f

Added to database: 5/21/2025, 5:52:54 PM

Last enriched: 7/7/2025, 1:41:36 PM

Last updated: 8/15/2025, 11:12:00 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats