An insertion of sensitive information into the log file in the audit log in GitHub Enterprise Server was identified that could allow an attacker to gain access to the management console. To exploit this, an attacker would need access to the log files for the GitHub Enterprise Server appliance, a backup archive created with GitHub Enterprise Server Backup Utilities, or a service which received streamed logs. This vulnerability affected all versions of GitHub Enterprise Server since 3.8 and was fixed in version 3.8.12, 3.9.7, 3.10.4, and 3.11.1. 
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: GitHub_P

Published: 2023-12-21T20:45:24.749Z

Updated: 2023-12-21T20:45:24.749Z

Reserved: 2023-12-13T19:25:56.875Z


Link: CVE-2023-6802

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2023-12-21T21:15:14.570

Modified: 2023-12-29T19:17:51.287


Link: CVE-2023-6802

JSON object: View

cve-icon Redhat Information

No data.

CWE