psytester1's profile picture. testing》ethical hacking》vulnerability》cve 🧱 don't ask me for malicious actions
https://infosec.exchange/@psytester

psytester

@psytester1

testing》ethical hacking》vulnerability》cve 🧱 don't ask me for malicious actions https://infosec.exchange/@psytester

Finally my PoC is out for Spring Cloud Gateway dynamic HTTP POST configuration abused as a SSRF service. psytester.github.io/noCVE-SpringGa…


Finally my PoC is out for CVE-2025-41253 Using Spring Expression Language To Expose Environment Variables and System Properties psytester.github.io/CVE-2025-41253/


Lessons learned 😊 If users encounter a class global variable as a singleton when logging in... In a race condition this gonna grills the session management. Which SAST would identify this vulnerability while coding?


Linux bash script creates variable by VAR=`eval echo ${USERINPUT}` where user controlled input is used What will happen? 😍


Does it make sense to publish a CVE ID already requested in 2021 or 2022 for a vulnerability fixed in 2025? Yes it took that time.... and in meantime it's duplicated by vendor with own CVE-2024-...


Information disclosure or Splunk feature(?) to fingerprint OS patch level psytester.github.io/SPLUNK_fingerp…


I published a found Remote Code Execution in Entersekt Transakt secure gateway psytester.github.io/Entersekt_tran…


I read "The MV3 Escape Artists" from @getsquarex about chrome extensions and thought "SquareX"? There was something! yes "DoubleX"! Is square the double of the double?🤭 No, I saw @AuroreFass talk at RuhrSec22 with her paper & slides aurore54f.github.io/publications/ The circle closes.


I need a break and will verify it once more, but it looks like I have found a #LFI in actual @Splunk version (9.1.5) 😍 Yes, I'm still pissed off with experience about Splunk's GTC enforcement.... But I'm a professional and know what to do


Splunk Windows Path Traversal CVE-2024-36991 not only works on "/modules/messaging/" endpoint in vulnerable versions. All module names are usable, "/modules/nav/" and "/modules/paginator/" are working as well. Fully unauthenticated access according to its CVSS score. 👍


Do you know this? Pissed off about issues meets dissatisfaction about not being able to exploit a known RCE vulnerability. This becomes a boost for me. The adrenaline kicks because a completely different RCE has been achieved as PoC exploit. The day is saved ❤️


Loading...

Something went wrong.


Something went wrong.