First published: Thu Dec 21 2023(Updated: )
An insertion of sensitive information into the log file in the audit log in GitHub Enterprise Server was identified that could allow an attacker to gain access to the management console. To exploit this, an attacker would need access to the log files for the GitHub Enterprise Server appliance, a backup archive created with GitHub Enterprise Server Backup Utilities, or a service which received streamed logs. This vulnerability affected all versions of GitHub Enterprise Server since 3.8 and was fixed in version 3.8.12, 3.9.7, 3.10.4, and 3.11.1.
Credit: product-cna@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitHub Enterprise Server | >=3.8.0<3.8.12 | |
GitHub Enterprise Server | >=3.9.0<3.9.7 | |
GitHub Enterprise Server | >=3.10.0<3.10.4 | |
GitHub Enterprise Server | =3.11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6802 has a high severity rating due to the potential exposure of sensitive information in the audit log.
To fix CVE-2023-6802, upgrade GitHub Enterprise Server to version 3.8.12, 3.9.7, 3.10.4, or 3.11.0.
CVE-2023-6802 affects GitHub Enterprise Server versions 3.8.0 to 3.8.12, 3.9.0 to 3.9.7, and 3.10.0 to 3.10.4.
If CVE-2023-6802 is exploited, an attacker could potentially gain unauthorized access to the management console.
Yes, CVE-2023-6802 is considered critical due to its potential to allow access to sensitive information.