CVE-2023-6746

Published Dec 21, 2023

Last updated 10 months ago

Overview

Description
An insertion of sensitive information into log file vulnerability was identified in the log files for a GitHub Enterprise Server back-end service that could permit an `adversary in the middle attack` when combined with other phishing techniques. To exploit this, an attacker would need access to the log files for the GitHub Enterprise Server appliance, a backup archive created with GitHub Enterprise Server Backup Utilities, or a service which received streamed logs. This vulnerability affected all versions of GitHub Enterprise Server since 3.7 and was fixed in version 3.7.19, 3.8.12, 3.9.7, 3.10.4, and 3.11.1. 
Source
product-cna@github.com
NVD status
Modified

Risk scores

CVSS 3.1

Type
Primary
Base score
5.7
Impact score
5.2
Exploitability score
0.5
Vector string
CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N
Severity
MEDIUM

Weaknesses

nvd@nist.gov
CWE-532
product-cna@github.com
CWE-532

Social media

Hype score
Not currently trending

Configurations