CVE-2023-6746

An insertion of sensitive information into log file vulnerability was identified in the log files for a GitHub Enterprise Server back-end service that could permit an `adversary in the middle attack` when combined with other phishing techniques. To exploit this, an attacker would need access to the log files for the GitHub Enterprise Server appliance, a backup archive created with GitHub Enterprise Server Backup Utilities, or a service which received streamed logs. This vulnerability affected all versions of GitHub Enterprise Server since 3.7 and was fixed in version 3.7.19, 3.8.12, 3.9.7, 3.10.4, and 3.11.1. 
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
cpe:2.3:a:github:enterprise_server:3.11.0:*:*:*:*:*:*:*

History

10 Jan 2024, 16:15

Type Values Removed Values Added
Summary An insertion of sensitive information into log file vulnerability was identified in the log files for a GitHub Enterprise Server back-end service that could permit an `adversary in the middle attack` when combined with other phishing techniques. To exploit this, an attacker would need access to the log files for the GitHub Enterprise Server appliance, a backup archive created with GitHub Enterprise Server Backup Utilities, or a service which received streamed logs. This vulnerability affected all versions of GitHub Enterprise Server since 3.7 and was fixed in version 3.17.19, 3.8.12, 3.9.7, 3.10.4, and 3.11.1.  An insertion of sensitive information into log file vulnerability was identified in the log files for a GitHub Enterprise Server back-end service that could permit an `adversary in the middle attack` when combined with other phishing techniques. To exploit this, an attacker would need access to the log files for the GitHub Enterprise Server appliance, a backup archive created with GitHub Enterprise Server Backup Utilities, or a service which received streamed logs. This vulnerability affected all versions of GitHub Enterprise Server since 3.7 and was fixed in version 3.7.19, 3.8.12, 3.9.7, 3.10.4, and 3.11.1. 

29 Dec 2023, 19:18

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.7
CWE CWE-532
References () https://docs.github.com/en/enterprise-server@3.9/admin/release-notes#3.9.7 - () https://docs.github.com/en/enterprise-server@3.9/admin/release-notes#3.9.7 - Release Notes
References () https://docs.github.com/en/enterprise-server@3.10/admin/release-notes#3.10.4 - () https://docs.github.com/en/enterprise-server@3.10/admin/release-notes#3.10.4 - Release Notes
References () https://docs.github.com/en/enterprise-server@3.8/admin/release-notes#3.8.12 - () https://docs.github.com/en/enterprise-server@3.8/admin/release-notes#3.8.12 - Release Notes
References () https://docs.github.com/en/enterprise-server@3.11/admin/release-notes#3.11.1 - () https://docs.github.com/en/enterprise-server@3.11/admin/release-notes#3.11.1 - Release Notes
References () https://docs.github.com/en/enterprise-server@3.7/admin/release-notes#3.7.19 - () https://docs.github.com/en/enterprise-server@3.7/admin/release-notes#3.7.19 - Release Notes
First Time Github enterprise Server
Github
CPE cpe:2.3:a:github:enterprise_server:3.11.0:*:*:*:*:*:*:*
cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*

21 Dec 2023, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-21 21:15

Updated : 2024-02-28 20:54


NVD link : CVE-2023-6746

Mitre link : CVE-2023-6746

CVE.ORG link : CVE-2023-6746


JSON object : View

Products Affected

github

  • enterprise_server
CWE
CWE-532

Insertion of Sensitive Information into Log File