๐คโจ Our security researcher, Konstantin Polishin, presented โRed Team Social Engineering 2024: Initial Access TTP and Project Experience of Our Teamโ at #ROOTCON18 ๐
Recording: https://youtube.com/watch?v=6nnZJiL0Tgk
Recording: https://youtube.com/watch?v=6nnZJiL0Tgk
๐29
๐พ Check out our latest publication on DMA attacks via SD cards!
The article was written by our researcher Gesser.
โก๏ธ https://swarm.ptsecurity.com/new-dog-old-tr
The article was written by our researcher Gesser.
โก๏ธ https://swarm.ptsecurity.com/new-dog-old-tr
PT SWARM
New dog, old tricks: DaMAgeCard attack targets memory directly thru SD card reader
Did I ever tell you what the definition of insanity is? Insanity is doing the exactโฆ same ******* thingโฆ over and over again expectingโฆ **** to changeโฆ That. Is. Crazy.Far Cry 3 Intro The peripheral device industry has once again sacrificed security in theโฆ
๐12
๐ป๐ณ The Positive Hack Talks in Vietnam has finished!
Slides from our researcher Arseniy Sharoglazov: https://static.ptsecurity.com/events/exch-vietnam.pdf
Wordlist: https://github.com/mohemiv/dodgypass
๐ Includes a PoC for MyQ Unauthenticated RCE! (CVE-2024-28059)
Slides from our researcher Arseniy Sharoglazov: https://static.ptsecurity.com/events/exch-vietnam.pdf
Wordlist: https://github.com/mohemiv/dodgypass
๐ Includes a PoC for MyQ Unauthenticated RCE! (CVE-2024-28059)
๐25
๐ป๐ณ At the Positive Hack Talks in Hanoi, our blue team member naumovax shared valuable insights:
1๏ธโฃ Architecture of an automation tool for detecting malware in the network
2๏ธโฃ Key features you should add to your tool
3๏ธโฃ Our refined Suricata rules
Link ๐ https://static.ptsecurity.com/events/stratocaster-how-we-automated-the-routine-search-for-unknown-malware-in-the-network-traffic.pdf
Link to our Suricata rules: https://rules.ptsecurity.com/
1๏ธโฃ Architecture of an automation tool for detecting malware in the network
2๏ธโฃ Key features you should add to your tool
3๏ธโฃ Our refined Suricata rules
Link ๐ https://static.ptsecurity.com/events/stratocaster-how-we-automated-the-routine-search-for-unknown-malware-in-the-network-traffic.pdf
Link to our Suricata rules: https://rules.ptsecurity.com/
๐24๐5
Exploiting SSTI in a Modern Spring Boot Application (3.3.4)
๐ค by parzel
The article explores exploiting a Server-Side Template Injection (SSTI) vulnerability in a Spring Boot 3.3.4 application using Thymeleaf, leading to Remote Code Execution (RCE). It highlights the process of injecting malicious input to trigger Java reflection and bypass security defenses in modern framework.
The post provides a detailed walkthrough of achieving RCE despite the robust safeguards present, emphasizing the complexity of exploiting such vulnerabilities in contemporary applications.
๐ Contents:
โ Identifying the Bug
โ Facing Problems
โ Bypassing the Defenses
โ Developing the Exploit
https://modzero.com/en/blog/spring_boot_ssti/
๐ค by parzel
The article explores exploiting a Server-Side Template Injection (SSTI) vulnerability in a Spring Boot 3.3.4 application using Thymeleaf, leading to Remote Code Execution (RCE). It highlights the process of injecting malicious input to trigger Java reflection and bypass security defenses in modern framework.
The post provides a detailed walkthrough of achieving RCE despite the robust safeguards present, emphasizing the complexity of exploiting such vulnerabilities in contemporary applications.
๐ Contents:
โ Identifying the Bug
โ Facing Problems
โ Bypassing the Defenses
โ Developing the Exploit
https://modzero.com/en/blog/spring_boot_ssti/
๐32
๐ฎ Xbox 360 security in details: the long way to RGH3. Read the exclusive story about the chipless and reliable Xbox 360 modding method by 15432h
๐ https://swarm.ptsecurity.com/xbox-360-security-in-details-the-long-way-to-rgh3/
Please open Telegram to view this post
VIEW IN TELEGRAM
๐18
๐ Our researcher a1exdandy has uncovered vulnerabilities in GD32 microcontrollers (GigaDevice) that bypass protection mechanisms, allowing memory extraction.
The article ๐ https://swarm.ptsecurity.com/gigavulnerability-readout-protection-bypass-on-gigadevice-gd32-mcus/
The article ๐ https://swarm.ptsecurity.com/gigavulnerability-readout-protection-bypass-on-gigadevice-gd32-mcus/
๐28
๐ฅ The "impossible" XXE in PHP? Not so impossible anymore.
Our researcher Aleksandr Zhurnakov discovered an interesting combination of PHP wrappers and a feature of XML parsing in libxml2 to exploit it.
Read: https://swarm.ptsecurity.com/impossible-xxe-in-php/
Our researcher Aleksandr Zhurnakov discovered an interesting combination of PHP wrappers and a feature of XML parsing in libxml2 to exploit it.
Read: https://swarm.ptsecurity.com/impossible-xxe-in-php/
๐54
Next.js and the corrupt middleware: the authorizing artifact
๐ค by Rachid Allam & Yasser Allam
Researchers have discovered a critical vulnerability in Next.js, a popular framework for building web applications. The flaw allows attackers to bypass middleware responsible for request processing, including authentication and path rewrites.
By adding the
Many versions of Next.js are affected, making this a widespread security concern.
๐ Contents:
โ The Next.js middleware
โ The authorizing artifact artifact: old code, 0ld treasure
โข Execution order and
โ The authorizing artifact: nostalgia has its charm, but living in the moment is better
โข /src directory
โข Max recursion depth
โ Exploits
โข Authorization/Rewrite bypass
โข CSP bypass
โข DoS via Cache-Poisoning (what?)
โข Clarification
โ Security Advisory - CVE-2025-29927
โ Disclaimer
โ Conclusion
https://zhero-web-sec.github.io/research-and-things/nextjs-and-the-corrupt-middleware
๐ค by Rachid Allam & Yasser Allam
Researchers have discovered a critical vulnerability in Next.js, a popular framework for building web applications. The flaw allows attackers to bypass middleware responsible for request processing, including authentication and path rewrites.
By adding the
x-middleware-subrequest header with a specific value, an attacker can completely ignore middleware execution, gaining unauthorized access to protected resources. Additionally, the vulnerability can be exploited for denial-of-service (DoS) attacks by poisoning the cache, leading to service disruption.Many versions of Next.js are affected, making this a widespread security concern.
๐ Contents:
โ The Next.js middleware
โ The authorizing artifact artifact: old code, 0ld treasure
โข Execution order and
middlewareInfo.nameโ The authorizing artifact: nostalgia has its charm, but living in the moment is better
โข /src directory
โข Max recursion depth
โ Exploits
โข Authorization/Rewrite bypass
โข CSP bypass
โข DoS via Cache-Poisoning (what?)
โข Clarification
โ Security Advisory - CVE-2025-29927
โ Disclaimer
โ Conclusion
https://zhero-web-sec.github.io/research-and-things/nextjs-and-the-corrupt-middleware
๐28
Don't Call That "Protected" Method: Dissecting an N-Day vBulletin RCE
๐ค by Egidio Romano
The article analyzes a critical Unauthenticated Remote Code Execution vulnerability (CVE-2025-48827) in vBulletin, which becomes exploitable when running on PHP 8.1 or newer.
The vulnerability stems from vBulletinโs misuse of
๐ Contents:
โ The Vulnerability
โ The vBulletin Vulnerability
โ Exploiting vBulletin: Path to Pre-Auth RCE
โ Conclusion
https://karmainsecurity.com/dont-call-that-protected-method-vbulletin-rce
๐ค by Egidio Romano
The article analyzes a critical Unauthenticated Remote Code Execution vulnerability (CVE-2025-48827) in vBulletin, which becomes exploitable when running on PHP 8.1 or newer.
The vulnerability stems from vBulletinโs misuse of
ReflectionMethod::invoke(), which in PHP 8.1+ no longer blocks access to protected methods by default. As a result, attackers can remotely trigger sensitive internal functions originally meant to be inaccessible and achieve code execution on the server.๐ Contents:
โ The Vulnerability
โ The vBulletin Vulnerability
โ Exploiting vBulletin: Path to Pre-Auth RCE
โ Conclusion
https://karmainsecurity.com/dont-call-that-protected-method-vbulletin-rce
๐17
This media is not supported in your browser
VIEW IN TELEGRAM
โ ๏ธ We've reproduced CVE-2025-49113 in Roundcube.
This vulnerability allows authenticated users to execute arbitrary commands via PHP object deserialization.
If you're running Roundcube โ update immediately!
This vulnerability allows authenticated users to execute arbitrary commands via PHP object deserialization.
If you're running Roundcube โ update immediately!
๐67๐2
๐ง Our researcher Sergey Tarasov discovered a vulnerability (CVE-2025-49689) in NTFS on MS Windows.
The article dives into the exploitation path, file system internals, VHD format, and more.
๐ Read the article: https://swarm.ptsecurity.com/buried-in-the-log-exploiting-a-20-years-old-ntfs-vulnerability/
The article dives into the exploitation path, file system internals, VHD format, and more.
๐ Read the article: https://swarm.ptsecurity.com/buried-in-the-log-exploiting-a-20-years-old-ntfs-vulnerability/
๐31
๐ Read the new article "Daemon Ex Plist: LPE via MacOS Daemons" by our researcher Egor Filatov.
This research reveals a vulnerability affecting popular apps like Mozilla VPN, Tunnelblick & more.
https://swarm.ptsecurity.com/daemon-ex-plist-lpe-via-macos-daemons/
This research reveals a vulnerability affecting popular apps like Mozilla VPN, Tunnelblick & more.
https://swarm.ptsecurity.com/daemon-ex-plist-lpe-via-macos-daemons/
PT SWARM
Daemon Ex Plist: LPE via MacOS Daemons
Introduction Today, we will try to figure out one mechanism for which there is not much information available on the internet and attempt to use the defect of this mechanism to exploit an LPE vulnerability. The mechanism we are going to look into is Mac-specificโฆ
๐22๐1
๐ Our researcher has discovered LPE in VMWare Tools (CVE-2025-22230 & CVE-2025-22247) via VGAuth!
Write-up by the one who broke it: Sergey Bliznyuk
https://swarm.ptsecurity.com/the-guest-who-could-exploiting-lpe-in-vmware-tools/
Write-up by the one who broke it: Sergey Bliznyuk
https://swarm.ptsecurity.com/the-guest-who-could-exploiting-lpe-in-vmware-tools/
๐43
๐จ We've launched dbugs.ptsecurity.com, a new home for vulnerabilities. More than CVEs. More than MITRE.
โ Trends & Insights
โ AI-generated, multi-source vulnerability descriptions
โ Researcher credits
Explore now: https://dbugs.ptsecurity.com
โ Trends & Insights
โ AI-generated, multi-source vulnerability descriptions
โ Researcher credits
Explore now: https://dbugs.ptsecurity.com
๐74๐3
๐ฑ New article by our researcher Artem Kulakov: Injection for an athlete.
Read about a vulnerability discovered in the Garmin Connect mobile application:
https://swarm.ptsecurity.com/injection-for-an-athlete/
Read about a vulnerability discovered in the Garmin Connect mobile application:
https://swarm.ptsecurity.com/injection-for-an-athlete/
PT SWARM
Injection for an athlete
After yet another workout where my sports watch completely lost GPS, Iโd had enough. I decided to dig into its firmware and pinpoint the problem. I couldnโt find it published anywhere. No download section, no public archive, nothing. So, I changed tacticsโฆ
๐23๐1
๐ A new article from our researchers Aleksey Solovev, Nikita Sveshnikov and Vladimir Razov โ "Blind trust: what is hidden behind the process of creating your PDF file?".
https://swarm.ptsecurity.com/blind-trust-what-is-hidden-behind-the-process-of-creating-your-pdf-file/
https://swarm.ptsecurity.com/blind-trust-what-is-hidden-behind-the-process-of-creating-your-pdf-file/
PT SWARM
Blind trust: what is hidden behind the process of creating your PDF file?
Every day, thousands of web services generate PDF (Portable Document Format) filesโbills, contracts, reports. This step is often treated as a technical routine, โjust convert the HTML,โ but in practice itโs exactly where a trust boundary is crossed. The rendererโฆ
๐21๐2