An insertion of sensitive information into log file vulnerability was identified in the log files for a GitHub Enterprise Server back-end service that could permit an `adversary in the middle attack` when combined with other phishing techniques. To exploit this, an attacker would need access to the log files for the GitHub Enterprise Server appliance, a backup archive created with GitHub Enterprise Server Backup Utilities, or a service which received streamed logs. This vulnerability affected all versions of GitHub Enterprise Server since 3.7 and was fixed in version 3.7.19, 3.8.12, 3.9.7, 3.10.4, and 3.11.1. 
History

Wed, 23 Apr 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_P

Published: 2023-12-21T20:45:23.261Z

Updated: 2025-04-23T16:22:17.760Z

Reserved: 2023-12-12T17:17:59.803Z

Link: CVE-2023-6746

cve-icon Vulnrichment

Updated: 2024-08-02T08:42:07.218Z

cve-icon NVD

Status : Analyzed

Published: 2023-12-21T21:15:14.303

Modified: 2024-12-16T19:07:48.603

Link: CVE-2023-6746

cve-icon Redhat

No data.