PR
Add CVE-2017-18365 GitHub Enterprise RCE detection
projectdiscovery/nuclei-templates#14452

/claim #14451

PR Information

GitHub Enterprise 2.8.x before 2.8.7 uses a hardcoded session secret, allowing unauthenticated RCE via Ruby deserialization.

Template validation

  • Validated with a host running a vulnerable version and/or configuration (True Positive)
  • Validated with a host running a patched version and/or configuration (avoid False Positive)

Additional Details

Detection logic follows the Metasploit module: extracts _gh_manage cookie, computes HMAC-SHA1 with known static secret, compares against signature.

GitHub Enterprise is proprietary - tested against mock servers simulating vulnerable/patched cookie signing behavior.

Additional References:

Claim

Total prize pool $100
Total paid $0
Status Pending
Submitted December 19, 2025
Last updated December 19, 2025

Contributors

KR

KrE80r

@KrE80r

100%

Sponsors

PR

ProjectDiscovery

@projectdiscovery

$100