SB2025052229 - Information disclosure in GitHub Desktop



SB2025052229 - Information disclosure in GitHub Desktop

Published: May 22, 2025

Security Bulletin ID SB2025052229
Severity
Medium
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Information disclosure

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Input validation error (CVE-ID: CVE-2025-48064)

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to insufficient validation of user-supplied input. When viewing a file diff in the history view GitHub Desktop will call git log or git diff with the object id (SHA) of the commit, the name of the file, and the old name of the file if the file has been renamed. s a security precaution Git will attempt to fully resolve the old and new path via realpath, traversing symlinks, to ensure that the resolved paths reside within the repository working directory. This can lead to Git attempting to access a path that resides on a network share (UNC path) and in doing so Windows will attempt to perform NTLM authentication which passes information such as the computer name, the currently signed in (Windows) user name, and an NTLM hash. An attacker convincing a user to view a file in a commit of their making in the history view can cause information disclosure by means of Git attempting to access a network share.


Remediation

Install update from vendor's website.