An insertion of sensitive information into the log file in the audit log in GitHub Enterprise Server was identified that could allow an attacker to gain access to the management console. To exploit this, an attacker would need access to the log files for the GitHub Enterprise Server appliance, a backup archive created with GitHub Enterprise Server Backup Utilities, or a service which received streamed logs. This vulnerability affected all versions of GitHub Enterprise Server since 3.8 and was fixed in version 3.8.12, 3.9.7, 3.10.4, and 3.11.1.
References
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitHub_P
Published: 2023-12-21T20:45:24.749Z
Updated: 2023-12-21T20:45:24.749Z
Reserved: 2023-12-13T19:25:56.875Z
Link: CVE-2023-6802
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-12-21T21:15:14.570
Modified: 2023-12-29T19:17:51.287
Link: CVE-2023-6802
JSON object: View
Redhat Information
No data.
CWE