cve-2023-6802
Vulnerability from cvelistv5
Published
2023-12-21 20:45
Modified
2024-09-13 14:55
Severity ?
EPSS score ?
Summary
An insertion of sensitive information into the log file in the audit log in GitHub Enterprise Server was identified that could allow an attacker to gain access to the management console. To exploit this, an attacker would need access to the log files for the GitHub Enterprise Server appliance, a backup archive created with GitHub Enterprise Server Backup Utilities, or a service which received streamed logs. This vulnerability affected all versions of GitHub Enterprise Server since 3.8 and was fixed in version 3.8.12, 3.9.7, 3.10.4, and 3.11.1.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | GitHub | Enterprise Server |
Version: 3.8.0 ≤ 3.8.11 Version: 3.9.0 ≤ 3.9.6 Version: 3.10.0 ≤ 3.10.3 Version: 3.11 ≤ 3.11.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:42:07.457Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://docs.github.com/en/enterprise-server@3.8/admin/release-notes#3.8.12" }, { "tags": [ "x_transferred" ], "url": "https://docs.github.com/en/enterprise-server@3.9/admin/release-notes#3.9.7" }, { "tags": [ "x_transferred" ], "url": "https://docs.github.com/en/enterprise-server@3.10/admin/release-notes#3.10.4" }, { "tags": [ "x_transferred" ], "url": "https://docs.github.com/en/enterprise-server@3.11/admin/release-notes#3.11.1" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-6802", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-02-27T16:11:11.467171Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-13T14:55:25.219Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Enterprise Server", "vendor": "GitHub", "versions": [ { "changes": [ { "at": "3.8.12", "status": "unaffected" } ], "lessThanOrEqual": "3.8.11", "status": "affected", "version": "3.8.0", "versionType": "semver" }, { "changes": [ { "at": "3.9.7", "status": "unaffected" } ], "lessThanOrEqual": "3.9.6", "status": "affected", "version": "3.9.0", "versionType": "semver" }, { "changes": [ { "at": "3.10.4", "status": "unaffected" } ], "lessThanOrEqual": "3.10.3", "status": "affected", "version": "3.10.0", "versionType": "semver" }, { "changes": [ { "at": "3.11.1", "status": "unaffected" } ], "lessThanOrEqual": "3.11.0", "status": "affected", "version": "3.11", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An insertion of sensitive information into the log file in the audit log in GitHub Enterprise Server was identified\u0026nbsp;that could allow an attacker to gain access to the management console. To exploit this, an attacker would need access to the log files for the GitHub Enterprise Server appliance, a backup archive created with GitHub Enterprise Server Backup Utilities, or a service which received streamed logs.\u0026nbsp;This vulnerability affected all versions of GitHub Enterprise Server since 3.8 and was fixed in version 3.8.12, 3.9.7, 3.10.4, and 3.11.1.\u0026nbsp;" } ], "value": "An insertion of sensitive information into the log file in the audit log in GitHub Enterprise Server was identified\u00a0that could allow an attacker to gain access to the management console. To exploit this, an attacker would need access to the log files for the GitHub Enterprise Server appliance, a backup archive created with GitHub Enterprise Server Backup Utilities, or a service which received streamed logs.\u00a0This vulnerability affected all versions of GitHub Enterprise Server since 3.8 and was fixed in version 3.8.12, 3.9.7, 3.10.4, and 3.11.1.\u00a0" } ], "impacts": [ { "capecId": "CAPEC-21", "descriptions": [ { "lang": "en", "value": "CAPEC-21 Exploitation of Trusted Credentials" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-532", "description": "CWE-532 Insertion of Sensitive Information into Log File", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-21T20:45:24.749Z", "orgId": "82327ea3-741d-41e4-88f8-2cf9e791e760", "shortName": "GitHub_P" }, "references": [ { "url": "https://docs.github.com/en/enterprise-server@3.8/admin/release-notes#3.8.12" }, { "url": "https://docs.github.com/en/enterprise-server@3.9/admin/release-notes#3.9.7" }, { "url": "https://docs.github.com/en/enterprise-server@3.10/admin/release-notes#3.10.4" }, { "url": "https://docs.github.com/en/enterprise-server@3.11/admin/release-notes#3.11.1" } ], "source": { "discovery": "INTERNAL" }, "title": "Sensitive Information in Log File in GitHub Enterprise Server ", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "82327ea3-741d-41e4-88f8-2cf9e791e760", "assignerShortName": "GitHub_P", "cveId": "CVE-2023-6802", "datePublished": "2023-12-21T20:45:24.749Z", "dateReserved": "2023-12-13T19:25:56.875Z", "dateUpdated": "2024-09-13T14:55:25.219Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2023-6802\",\"sourceIdentifier\":\"product-cna@github.com\",\"published\":\"2023-12-21T21:15:14.570\",\"lastModified\":\"2024-11-21T08:44:35.203\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An insertion of sensitive information into the log file in the audit log in GitHub Enterprise Server was identified\u00a0that could allow an attacker to gain access to the management console. To exploit this, an attacker would need access to the log files for the GitHub Enterprise Server appliance, a backup archive created with GitHub Enterprise Server Backup Utilities, or a service which received streamed logs.\u00a0This vulnerability affected all versions of GitHub Enterprise Server since 3.8 and was fixed in version 3.8.12, 3.9.7, 3.10.4, and 3.11.1.\u00a0\"},{\"lang\":\"es\",\"value\":\"Se identific\u00f3 una inserci\u00f3n de informaci\u00f3n confidencial en el archivo de registro del registro de auditor\u00eda en GitHub Enterprise Server que podr\u00eda permitir que un atacante obtenga acceso a la consola de administraci\u00f3n. Para explotar esto, un atacante necesitar\u00eda acceso a los archivos de registro del dispositivo GitHub Enterprise Server, un archivo de respaldo creado con GitHub Enterprise Server Backup Utilities o un servicio que recibiera registros transmitidos. Esta vulnerabilidad afect\u00f3 a todas las versiones de GitHub Enterprise Server desde la 3.8 y se solucion\u00f3 en las versiones 3.8.12, 3.9.7, 3.10.4 y 3.11.1.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"product-cna@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.2,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"product-cna@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-532\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-532\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.8.0\",\"versionEndExcluding\":\"3.8.12\",\"matchCriteriaId\":\"B3D983FF-FDDE-484C-AA34-31EB52E25EC2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.9.0\",\"versionEndExcluding\":\"3.9.7\",\"matchCriteriaId\":\"B118EB53-4459-4817-8F74-002DBA4860DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.10.0\",\"versionEndExcluding\":\"3.10.4\",\"matchCriteriaId\":\"F65FB74F-11AB-439B-9CF0-9F08E03E4083\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:github:enterprise_server:3.11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC723276-C3EE-4F79-857A-3A5C078C33E2\"}]}]}],\"references\":[{\"url\":\"https://docs.github.com/en/enterprise-server@3.10/admin/release-notes#3.10.4\",\"source\":\"product-cna@github.com\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://docs.github.com/en/enterprise-server@3.11/admin/release-notes#3.11.1\",\"source\":\"product-cna@github.com\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://docs.github.com/en/enterprise-server@3.8/admin/release-notes#3.8.12\",\"source\":\"product-cna@github.com\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://docs.github.com/en/enterprise-server@3.9/admin/release-notes#3.9.7\",\"source\":\"product-cna@github.com\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://docs.github.com/en/enterprise-server@3.10/admin/release-notes#3.10.4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://docs.github.com/en/enterprise-server@3.11/admin/release-notes#3.11.1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://docs.github.com/en/enterprise-server@3.8/admin/release-notes#3.8.12\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://docs.github.com/en/enterprise-server@3.9/admin/release-notes#3.9.7\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.