/claim #14451
nuclei -validateDetection Approach:
/setup/unlock endpoint on GitHub Enterprise Management Console_gh_manage cookie (indicates exploitable configuration)Why Detection-Only: Previous PRs (#14452, #14454) attempted exploitation (timing-based and OAST) but were closed. This template focuses on reliable detection of the vulnerable configuration:
641dd6454584ddabfed6342cc66281fb)[base64_data]--[sha1_hmac]Note on Exploitation: Full exploitation requires crafting Ruby Marshal payloads with the known secret. The complex serialization structure and Ruby version dependencies make reliable nuclei-based exploitation challenging. The detection approach provides practical value for identifying vulnerable targets.
Shodan Query: http.title:"github debug"
Syed Azeez
@syedazeez337-gmail-com
ProjectDiscovery
@projectdiscovery