An improper cache key vulnerability was identified in GitHub Enterprise Server that allowed an unauthorized actor to access private repository files through a public repository. To exploit this, an actor would need to already be authorized on the GitHub Enterprise Server instance, be able to create a public repository, and have a site administrator visit a specially crafted URL. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.6 and was fixed in versions 3.2.20, 3.3.15, 3.4.10, 3.5.7, 3.6.3. This vulnerability was reported via the GitHub Bug Bounty program.
                
            Metrics
Affected Vendors & Products
References
        History
                    Tue, 06 May 2025 15:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: GitHub_P
Published: 2022-11-01T00:00:00.000Z
Updated: 2025-05-06T14:35:41.946Z
Reserved: 2022-01-19T00:00:00.000Z
Link: CVE-2022-23738
 Vulnrichment
                        Vulnrichment
                    Updated: 2024-08-03T03:51:46.239Z
 NVD
                        NVD
                    Status : Modified
Published: 2022-11-01T18:15:10.897
Modified: 2025-05-06T15:15:57.750
Link: CVE-2022-23738
 Redhat
                        Redhat
                    No data.