Executive Summary

Informations
Name CVE-2023-6746 First vendor Publication 2023-12-21
Vendor Cve Last vendor Modification 2024-01-10

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N
Overall CVSS Score 5.7
Base Score 5.7 Environmental Score 5.7
impact SubScore 5.2 Temporal Score 5.7
Exploitabality Sub Score 0.5
 
Attack Vector Network Attack Complexity High
Privileges Required High User Interaction Required
Scope Unchanged Confidentiality Impact High
Integrity Impact High Availability Impact None
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

An insertion of sensitive information into log file vulnerability was identified in the log files for a GitHub Enterprise Server back-end service that could permit an `adversary in the middle attack` when combined with other phishing techniques. To exploit this, an attacker would need access to the log files for the GitHub Enterprise Server appliance, a backup archive created with GitHub Enterprise Server Backup Utilities, or a service which received streamed logs. This vulnerability affected all versions of GitHub Enterprise Server since 3.7 and was fixed in version 3.7.19, 3.8.12, 3.9.7, 3.10.4, and 3.11.1.Â

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6746

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-532 Information Leak Through Log Files

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8

Sources (Detail)

https://docs.github.com/en/enterprise-server@3.10/admin/release-notes#3.10.4
https://docs.github.com/en/enterprise-server@3.11/admin/release-notes#3.11.1
https://docs.github.com/en/enterprise-server@3.7/admin/release-notes#3.7.19
https://docs.github.com/en/enterprise-server@3.8/admin/release-notes#3.8.12
https://docs.github.com/en/enterprise-server@3.9/admin/release-notes#3.9.7
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
Date Informations
2024-09-28 02:51:38
  • Multiple Updates
2024-09-18 02:45:05
  • Multiple Updates
2024-01-10 21:27:42
  • Multiple Updates
2023-12-30 00:27:23
  • Multiple Updates
2023-12-22 17:27:26
  • Multiple Updates
2023-12-22 00:27:22
  • First insertion