An insertion of sensitive information into log file vulnerability was identified in the log files for a GitHub Enterprise Server back-end service that could permit an `adversary in the middle attack` when combined with other phishing techniques. To exploit this, an attacker would need access to the log files for the GitHub Enterprise Server appliance, a backup archive created with GitHub Enterprise Server Backup Utilities, or a service which received streamed logs. This vulnerability affected all versions of GitHub Enterprise Server since 3.7 and was fixed in version 3.7.19, 3.8.12, 3.9.7, 3.10.4, and 3.11.1.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: GitHub_P
Published:
Updated: 2024-08-02T08:42:07.218Z
Reserved: 2023-12-12T17:17:59.803Z
Link: CVE-2023-6746

No data.

Status : Analyzed
Published: 2023-12-21T21:15:14.303
Modified: 2024-12-16T19:07:48.603
Link: CVE-2023-6746

No data.