An improper cache key vulnerability was identified in GitHub Enterprise Server that allowed an unauthorized actor to access private repository files through a public repository. To exploit this, an actor would need to already be authorized on the GitHub Enterprise Server instance, be able to create a public repository, and have a site administrator visit a specially crafted URL. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.6 and was fixed in versions 3.2.20, 3.3.15, 3.4.10, 3.5.7, 3.6.3. This vulnerability was reported via the GitHub Bug Bounty program.
Metrics
Affected Vendors & Products
References
History
Tue, 06 May 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: GitHub_P
Published: 2022-11-01T00:00:00.000Z
Updated: 2025-05-06T14:35:41.946Z
Reserved: 2022-01-19T00:00:00.000Z
Link: CVE-2022-23738

Updated: 2024-08-03T03:51:46.239Z

Status : Modified
Published: 2022-11-01T18:15:10.897
Modified: 2025-05-06T15:15:57.750
Link: CVE-2022-23738

No data.