Add CVE-2017-18365 GitHub Enterprise Insecure Deserialization RCE #14667
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
PR Information
/claim #14451
Template validation
nuclei -validateAdditional Details
Detection Approach:
/setup/unlockendpoint on GitHub Enterprise Management Console_gh_managecookie (indicates exploitable configuration)Why Detection-Only:
Previous PRs (#14452, #14454) attempted exploitation (timing-based and OAST) but were closed. This template focuses on reliable detection of the vulnerable configuration:
641dd6454584ddabfed6342cc66281fb)[base64_data]--[sha1_hmac]Note on Exploitation:
Full exploitation requires crafting Ruby Marshal payloads with the known secret. The complex serialization structure and Ruby version dependencies make reliable nuclei-based exploitation challenging. The detection approach provides practical value for identifying vulnerable targets.
Shodan Query:
http.title:"github debug"Additional References: