First published: Thu Dec 21 2023(Updated: )
An insertion of sensitive information into log file vulnerability was identified in the log files for a GitHub Enterprise Server back-end service that could permit an `adversary in the middle attack` when combined with other phishing techniques. To exploit this, an attacker would need access to the log files for the GitHub Enterprise Server appliance, a backup archive created with GitHub Enterprise Server Backup Utilities, or a service which received streamed logs. This vulnerability affected all versions of GitHub Enterprise Server since 3.7 and was fixed in version 3.7.19, 3.8.12, 3.9.7, 3.10.4, and 3.11.1.
Credit: product-cna@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitHub Enterprise Server | >=3.7.0<3.7.19 | |
GitHub Enterprise Server | >=3.8.0<3.8.12 | |
GitHub Enterprise Server | >=3.9.0<3.9.7 | |
GitHub Enterprise Server | >=3.10.0<3.10.4 | |
GitHub Enterprise Server | =3.11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6746 is classified as a moderate severity vulnerability.
To fix CVE-2023-6746, upgrade to a non-affected version of GitHub Enterprise Server, specifically versions 3.7.19, 3.8.12, 3.9.7, 3.10.4, or above 3.11.0.
CVE-2023-6746 affects multiple versions of GitHub Enterprise Server including versions 3.7.0 to 3.7.19, 3.8.0 to 3.8.12, 3.9.0 to 3.9.7, and 3.10.0 to 3.10.4, as well as version 3.11.0.
CVE-2023-6746 can potentially allow for an adversary in the middle attack when combined with other phishing techniques.
CVE-2023-6746 involves the insertion of sensitive information into log files, which could be exploited by attackers.