Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2023-6802

Опубликовано: 21 дек. 2023
Источник: nvd
CVSS3: 7.2
CVSS3: 6.5
EPSS Низкий

Описание

An insertion of sensitive information into the log file in the audit log in GitHub Enterprise Server was identified that could allow an attacker to gain access to the management console. To exploit this, an attacker would need access to the log files for the GitHub Enterprise Server appliance, a backup archive created with GitHub Enterprise Server Backup Utilities, or a service which received streamed logs. This vulnerability affected all versions of GitHub Enterprise Server since 3.8 and was fixed in version 3.8.12, 3.9.7, 3.10.4, and 3.11.1. 

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
Версия от 3.8.0 (включая) до 3.8.12 (исключая)
cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
Версия от 3.9.0 (включая) до 3.9.7 (исключая)
cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
Версия от 3.10.0 (включая) до 3.10.4 (исключая)
cpe:2.3:a:github:enterprise_server:3.11.0:*:*:*:*:*:*:*

EPSS

Процентиль: 12%
0.00039
Низкий

7.2 High

CVSS3

6.5 Medium

CVSS3

Дефекты

CWE-532
CWE-532

Связанные уязвимости

CVSS3: 7.2
github
около 2 лет назад

An insertion of sensitive information into the log file in the audit log in GitHub Enterprise Server was identified that could allow an attacker to gain access to the management console. To exploit this, an attacker would need access to the log files for the GitHub Enterprise Server appliance, a backup archive created with GitHub Enterprise Server Backup Utilities, or a service which received streamed logs. This vulnerability affected all versions of GitHub Enterprise Server since 3.8 and was fixed in version 3.8.12, 3.9.7, 3.10.4, and 3.11.1. 

EPSS

Процентиль: 12%
0.00039
Низкий

7.2 High

CVSS3

6.5 Medium

CVSS3

Дефекты

CWE-532
CWE-532