An improper cache key vulnerability was identified in GitHub Enterprise Server that allowed an unauthorized actor to access private repository files through a public repository. To exploit this, an actor would need to already be authorized on the GitHub Enterprise Server instance, be able to create a public repository, and have a site administrator visit a specially crafted URL. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.6 and was fixed in versions 3.2.20, 3.3.15, 3.4.10, 3.5.7, 3.6.3. This vulnerability was reported via the GitHub Bug Bounty program.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: GitHub_P
Published: 2022-11-01T00:00:00
Updated: 2024-08-03T03:51:46.239Z
Reserved: 2022-01-19T00:00:00
Link: CVE-2022-23738
Vulnrichment
No data.
NVD
Status : Modified
Published: 2022-11-01T18:15:10.897
Modified: 2024-11-21T06:49:12.737
Link: CVE-2022-23738
Redhat
No data.