- Description
- An insertion of sensitive information into log file vulnerability was identified in the log files for a GitHub Enterprise Server back-end service that could permit an `adversary in the middle attack` when combined with other phishing techniques. To exploit this, an attacker would need access to the log files for the GitHub Enterprise Server appliance, a backup archive created with GitHub Enterprise Server Backup Utilities, or a service which received streamed logs. This vulnerability affected all versions of GitHub Enterprise Server since 3.7 and was fixed in version 3.7.19, 3.8.12, 3.9.7, 3.10.4, and 3.11.1.
- Source
- product-cna@github.com
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 5.7
- Impact score
- 5.2
- Exploitability score
- 0.5
- Vector string
- CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N
- Severity
- MEDIUM
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "9C219467-E463-4C59-AAD7-8BECDA8AA1AE",
"versionEndExcluding": "3.7.19",
"versionStartIncluding": "3.7.0"
},
{
"criteria": "cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "B3D983FF-FDDE-484C-AA34-31EB52E25EC2",
"versionEndExcluding": "3.8.12",
"versionStartIncluding": "3.8.0"
},
{
"criteria": "cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "B118EB53-4459-4817-8F74-002DBA4860DA",
"versionEndExcluding": "3.9.7",
"versionStartIncluding": "3.9.0"
},
{
"criteria": "cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "F65FB74F-11AB-439B-9CF0-9F08E03E4083",
"versionEndExcluding": "3.10.4",
"versionStartIncluding": "3.10.0"
},
{
"criteria": "cpe:2.3:a:github:enterprise_server:3.11.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "AC723276-C3EE-4F79-857A-3A5C078C33E2"
}
],
"operator": "OR"
}
]
}
]