ghsa-fc6j-9f2x-v9w8
Vulnerability from github
Published
2023-12-21 21:30
Modified
2024-01-10 18:30
Severity ?
Details
An insertion of sensitive information into log file vulnerability was identified in the log files for a GitHub Enterprise Server back-end service that could permit an adversary in the middle attack
when combined with other phishing techniques. To exploit this, an attacker would need access to the log files for the GitHub Enterprise Server appliance, a backup archive created with GitHub Enterprise Server Backup Utilities, or a service which received streamed logs. This vulnerability affected all versions of GitHub Enterprise Server since 3.7 and was fixed in version 3.17.19, 3.8.12, 3.9.7, 3.10.4, and 3.11.1.
{ "affected": [], "aliases": [ "CVE-2023-6746" ], "database_specific": { "cwe_ids": [ "CWE-532" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2023-12-21T21:15:14Z", "severity": "HIGH" }, "details": "An insertion of sensitive information into log file vulnerability was identified in the log files for a GitHub Enterprise Server back-end service that could permit an `adversary in the middle attack` when combined with other phishing techniques. To exploit this, an attacker would need access to the log files for the GitHub Enterprise Server appliance, a backup archive created with GitHub Enterprise Server Backup Utilities, or a service which received streamed logs.\u00a0This vulnerability affected all versions of GitHub Enterprise Server since 3.7 and was fixed in version 3.17.19, 3.8.12, 3.9.7, 3.10.4, and 3.11.1.\u00a0", "id": "GHSA-fc6j-9f2x-v9w8", "modified": "2024-01-10T18:30:24Z", "published": "2023-12-21T21:30:32Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6746" }, { "type": "WEB", "url": "https://docs.github.com/en/enterprise-server@3.10/admin/release-notes#3.10.4" }, { "type": "WEB", "url": "https://docs.github.com/en/enterprise-server@3.11/admin/release-notes#3.11.1" }, { "type": "WEB", "url": "https://docs.github.com/en/enterprise-server@3.7/admin/release-notes#3.7.19" }, { "type": "WEB", "url": "https://docs.github.com/en/enterprise-server@3.8/admin/release-notes#3.8.12" }, { "type": "WEB", "url": "https://docs.github.com/en/enterprise-server@3.9/admin/release-notes#3.9.7" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N", "type": "CVSS_V3" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.