An insertion of sensitive information into the log file in the audit log in GitHub Enterprise Server was identified that could allow an attacker to gain access to the management console. To exploit this, an attacker would need access to the log files for the GitHub Enterprise Server appliance, a backup archive created with GitHub Enterprise Server Backup Utilities, or a service which received streamed logs. This vulnerability affected all versions of GitHub Enterprise Server since 3.8 and was fixed in version 3.8.12, 3.9.7, 3.10.4, and 3.11.1. 
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_P

Published: 2023-12-21T20:45:24.749Z

Updated: 2024-09-13T14:55:25.219Z

Reserved: 2023-12-13T19:25:56.875Z

Link: CVE-2023-6802

cve-icon Vulnrichment

Updated: 2024-08-02T08:42:07.457Z

cve-icon NVD

Status : Modified

Published: 2023-12-21T21:15:14.570

Modified: 2024-11-21T08:44:35.203

Link: CVE-2023-6802

cve-icon Redhat

No data.