/claim #14451
GitHub Enterprise 2.8.x before 2.8.7 uses a hardcoded session secret, allowing unauthenticated RCE via Ruby deserialization.
Detection logic follows the Metasploit module: extracts _gh_manage cookie, computes HMAC-SHA1 with known static secret, compares against signature.
GitHub Enterprise is proprietary - tested against mock servers simulating vulnerable/patched cookie signing behavior.
KrE80r
@KrE80r
ProjectDiscovery
@projectdiscovery