An insertion of sensitive information into the log file in the audit log in GitHub Enterprise Server was identified that could allow an attacker to gain access to the management console. To exploit this, an attacker would need access to the log files for the GitHub Enterprise Server appliance, a backup archive created with GitHub Enterprise Server Backup Utilities, or a service which received streamed logs. This vulnerability affected all versions of GitHub Enterprise Server since 3.8 and was fixed in version 3.8.12, 3.9.7, 3.10.4, and 3.11.1.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: GitHub_P
Published: 2023-12-21T20:45:24.749Z
Updated: 2024-09-13T14:55:25.219Z
Reserved: 2023-12-13T19:25:56.875Z
Link: CVE-2023-6802
Vulnrichment
Updated: 2024-08-02T08:42:07.457Z
NVD
Status : Modified
Published: 2023-12-21T21:15:14.570
Modified: 2024-11-21T08:44:35.203
Link: CVE-2023-6802
Redhat
No data.