@@ -16,11 +16,11 @@ def initialize(info={})
16
16
super ( update_info ( info ,
17
17
'Name' => "Github Enterprise Default Session Secret And Deserialization Vulnerability" ,
18
18
'Description' => %q{
19
- This module exploits two security issues in Github Enterprise, version 2.8. The first is
20
- that the session management uses a hard-coded secret value, which can be abused to sign
21
- a serialized malicious Ruby object. The second problem is due to the use of unsafe
22
- deserialization, which allows the malicious Ruby object to be loaded, and results
23
- in arbitrary remote code execution.
19
+ This module exploits two security issues in Github Enterprise, version 2.8.0 - 2.8.6.
20
+ The first is that the session management uses a hard-coded secret value, which can be
21
+ abused to sign a serialized malicious Ruby object. The second problem is due to the
22
+ use of unsafe deserialization, which allows the malicious Ruby object to be loaded,
23
+ and results in arbitrary remote code execution.
24
24
25
25
This exploit was tested against version 2.8.0.
26
26
} ,
@@ -33,7 +33,8 @@ def initialize(info={})
33
33
'References' =>
34
34
[
35
35
[ 'EDB' , '41616' ] ,
36
- [ 'URL' , 'http://exablue.de/blog/2017-03-15-github-enterprise-remote-code-execution.html' ]
36
+ [ 'URL' , 'http://exablue.de/blog/2017-03-15-github-enterprise-remote-code-execution.html' ] ,
37
+ [ 'URL' , 'https://enterprise.github.com/releases/2.8.7/notes' ] # Patched in this version
37
38
] ,
38
39
'Platform' => 'linux' ,
39
40
'Targets' =>
0 commit comments