pyn3rd (@pyn3rd) 's Twitter Profile
pyn3rd

@pyn3rd

Security Researcher&Red Team&Cloud Security. BlackHat&HITB&CanSecWest Speaker.

ID: 700586855947829248

linkhttps://blog.pyn3rd.com calendar_today19-02-2016 07:44:57

822 Tweet

13,13K Takipçi

561 Takip Edilen

pyn3rd (@pyn3rd) 's Twitter Profile Photo

Activiti is a lightweight workflow and Business Process Management (BPM) platform that supports Expression Language expressions within its flows. In this example, I demonstrate how to exploit this feature to trigger RCE in a SpringBoot environment.

pyn3rd (@pyn3rd) 's Twitter Profile Photo

#CVE-2024-49194 Databricks JDBC Driver via JAAS, Make JDBC Attack Great Again!! I’ve included the link to my write-up below. Enjoy!! blog.pyn3rd.com/2024/12/13/Dat…

Michael Stepankin (@artsploit) 's Twitter Profile Photo

Last year, I committed to uncovering critical vulnerabilities in Maven repositories. Now it’s time to share the findings: RCE in Sonatype Nexus, Cache Poisoning in JFrog Artifactory, and more! Read it all below 🧵

Last year, I committed to uncovering critical vulnerabilities in Maven repositories. Now it’s time to share the findings: RCE in Sonatype Nexus, Cache Poisoning in JFrog Artifactory, and more! Read it all below 🧵
pyn3rd (@pyn3rd) 's Twitter Profile Photo

It was a genuine pleasure meeting shubs in Sydney and receiving your insightful advice and valuable information. Thank you! Hope to see you again soon!

Nir Ohfeld (@nirohfeld) 's Twitter Profile Photo

We (+sagitz Ronen Shustin Hillai Ben-Sasson) found a series of unauthenticated RCEs in core @KubernetesIO project "Ingress-NGINX". The impact? From zero permissions ➡️ to complete cluster takeover 🤯 This is the story of #IngressNightmare 🧵⬇️

We (+<a href="/sagitz_/">sagitz</a> <a href="/ronenshh/">Ronen Shustin</a> <a href="/hillai/">Hillai Ben-Sasson</a>) found a series of unauthenticated RCEs in core @KubernetesIO project "Ingress-NGINX".

The impact?

From zero permissions ➡️ to complete cluster takeover 🤯

This is the story of #IngressNightmare 🧵⬇️
pyn3rd (@pyn3rd) 's Twitter Profile Photo

#Bugcrowd Team's handling of my recent report has been absurd. I reported a bug 6 days ago, but they didn’t attempt to reproduce it right away. Today, after it was already fixed, they reproduced it and claimed the bug is no longer applicable, considering it theoretical.bugcrowd

#Bugcrowd Team's handling of my recent report has been absurd. I reported a bug 6 days ago, but they didn’t attempt to reproduce it right away. Today, after it was already fixed, they reproduced it and claimed the bug is no longer applicable, considering it theoretical.<a href="/Bugcrowd/">bugcrowd</a>
Wiz (@wiz_io) 's Twitter Profile Photo

🚨 New research: A cryptomining campaign is hijacking exposed PostgreSQL, hiding payloads in fake 404 pages, and abusing legit infra. Multiplatform, stealthy, and still active 👉 wiz.io/blog/soco404-m…

🚨 New research: A cryptomining campaign is hijacking exposed PostgreSQL, hiding payloads in fake 404 pages, and abusing legit infra. 
Multiplatform, stealthy, and still active 👉 wiz.io/blog/soco404-m…
qt qt (@q810034) 's Twitter Profile Photo

I just published From XSS to RCE: Critical Vulnerability Chain in Anthropic MCP Inspector(CVE-2025–58444) medium.com/p/from-xss-to-…

pyn3rd (@pyn3rd) 's Twitter Profile Photo

Does anyone happen to know someone on the Cloudflare Security team? I’ll be in the US next month and would like to arrange a visit if feasible.

pyn3rd (@pyn3rd) 's Twitter Profile Photo

The JDBC attack surface goes far beyond this. I still have some unpublished research, and if there’s an opportunity, we could definitely collaborate. 8,5000 dollars is certainly a substantial reward. It’s absolutely insane!!! Congrats!

pyn3rd (@pyn3rd) 's Twitter Profile Photo

I’ll be vacationing in the U.S. during the Christmas holidays, and if I have time, I’d love to meet up and chat with everyone in person.