8.1

CVE-2023-6746

An insertion of sensitive information into log file vulnerability was identified in the log files for a GitHub Enterprise Server back-end service that could permit an `adversary in the middle attack` when combined with other phishing techniques. To exploit this, an attacker would need access to the log files for the GitHub Enterprise Server appliance, a backup archive created with GitHub Enterprise Server Backup Utilities, or a service which received streamed logs. This vulnerability affected all versions of GitHub Enterprise Server since 3.7 and was fixed in version 3.7.19, 3.8.12, 3.9.7, 3.10.4, and 3.11.1. 
Data is provided by the National Vulnerability Database (NVD)
GithubEnterprise Server Version >= 3.7.0 < 3.7.19
GithubEnterprise Server Version >= 3.8.0 < 3.8.12
GithubEnterprise Server Version >= 3.9.0 < 3.9.7
GithubEnterprise Server Version >= 3.10.0 < 3.10.4
GithubEnterprise Server Version3.11.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.18% 0.4
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 5.7 0.5 5.2
CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N
product-cna@github.com 8.1 1.7 5.8
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N
CWE-532 Insertion of Sensitive Information into Log File

The product writes sensitive information to a log file.