Skip to content

Commit 2488100

Browse files
committed
Add bounty info
1 parent 196a0b6 commit 2488100

File tree

1 file changed

+3
-0
lines changed

1 file changed

+3
-0
lines changed

documentation/modules/exploit/linux/http/github_enterprise_secret.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,9 @@ serialized malicious object. The second problem is that the serialized string is
44
a ```Marshal.load``` API call, which deserializes the malicious object, and executes it. A
55
malicious attacker can take advantage of these problems to achieve remote code execution.
66

7+
According to exablue.de, this RCE was reported to GitHub, and the researcher was rewarded
8+
$18,000 total.
9+
710
## Vulnerable Application
811

912
For testing purposes, you can download a Github Enterprise image from the following location:

0 commit comments

Comments
 (0)