psytester
@psytester1
testing》ethical hacking》vulnerability》cve 🧱 don't ask me for malicious actions https://infosec.exchange/@psytester
You might like
Finally my PoC is out for Spring Cloud Gateway dynamic HTTP POST configuration abused as a SSRF service. psytester.github.io/noCVE-SpringGa…
Finally my PoC is out for CVE-2025-41253 Using Spring Expression Language To Expose Environment Variables and System Properties psytester.github.io/CVE-2025-41253/
Lessons learned 😊 If users encounter a class global variable as a singleton when logging in... In a race condition this gonna grills the session management. Which SAST would identify this vulnerability while coding?
Linux bash script creates variable by VAR=`eval echo ${USERINPUT}` where user controlled input is used What will happen? 😍
Does it make sense to publish a CVE ID already requested in 2021 or 2022 for a vulnerability fixed in 2025? Yes it took that time.... and in meantime it's duplicated by vendor with own CVE-2024-...
Information disclosure or Splunk feature(?) to fingerprint OS patch level psytester.github.io/SPLUNK_fingerp…
I published a found Remote Code Execution in Entersekt Transakt secure gateway psytester.github.io/Entersekt_tran…
I read "The MV3 Escape Artists" from @getsquarex about chrome extensions and thought "SquareX"? There was something! yes "DoubleX"! Is square the double of the double?🤭 No, I saw @AuroreFass talk at RuhrSec22 with her paper & slides aurore54f.github.io/publications/ The circle closes.
I need a break and will verify it once more, but it looks like I have found a #LFI in actual @Splunk version (9.1.5) 😍 Yes, I'm still pissed off with experience about Splunk's GTC enforcement.... But I'm a professional and know what to do
Splunk Windows Path Traversal CVE-2024-36991 not only works on "/modules/messaging/" endpoint in vulnerable versions. All module names are usable, "/modules/nav/" and "/modules/paginator/" are working as well. Fully unauthenticated access according to its CVSS score. 👍
Do you know this? Pissed off about issues meets dissatisfaction about not being able to exploit a known RCE vulnerability. This becomes a boost for me. The adrenaline kicks because a completely different RCE has been achieved as PoC exploit. The day is saved ❤️
United States Trends
- 1. Good Monday 33.1K posts
- 2. #MondayMotivation 8,692 posts
- 3. TOP CALL 3,969 posts
- 4. AI Alert 1,664 posts
- 5. Market Focus 2,735 posts
- 6. Check Analyze N/A
- 7. Token Signal 2,180 posts
- 8. Victory Monday 1,625 posts
- 9. #centralwOrldXmasXFreenBecky 643K posts
- 10. SAROCHA REBECCA DISNEY AT CTW 663K posts
- 11. NAMJOON 64.9K posts
- 12. #LingOrmDiorAmbassador 328K posts
- 13. DOGE 191K posts
- 14. #BaddiesUSA 68.2K posts
- 15. Chip Kelly 9,732 posts
- 16. Happy Thanksgiving 10.4K posts
- 17. Monad 125K posts
- 18. Soles 78.7K posts
- 19. Stacey 23.8K posts
- 20. Stefanski 10.1K posts
Something went wrong.
Something went wrong.