PT SWARM – Telegram
PT SWARM
6.98K subscribers
133 photos
7 videos
1 file
200 links
Positive Technologies Offensive Team: twitter.com/ptswarm

This is the channel where we share articles/vulnerabilities/noscripts/etc, not necessarily authored by us, that we find interesting
Download Telegram
🎤 Our security researcher, Konstantin Polishin, presented “Red Team Social Engineering 2024: Initial Access TTP and Project Experience of Our Team” at #ROOTCON18 🚀

Recording: https://youtube.com/watch?v=6nnZJiL0Tgk
👍29
🇻🇳 The Positive Hack Talks in Vietnam has finished!

Slides from our researcher Arseniy Sharoglazov: https://static.ptsecurity.com/events/exch-vietnam.pdf

Wordlist: https://github.com/mohemiv/dodgypass

🎁 Includes a PoC for MyQ Unauthenticated RCE! (CVE-2024-28059)
👍25
🇻🇳 At the Positive Hack Talks in Hanoi, our blue team member naumovax shared valuable insights:

1️⃣ Architecture of an automation tool for detecting malware in the network
2️⃣ Key features you should add to your tool
3️⃣ Our refined Suricata rules

Link 👉 https://static.ptsecurity.com/events/stratocaster-how-we-automated-the-routine-search-for-unknown-malware-in-the-network-traffic.pdf

Link to our Suricata rules: https://rules.ptsecurity.com/
👍24👎5
Exploiting SSTI in a Modern Spring Boot Application (3.3.4)

👤 by parzel

The article explores exploiting a Server-Side Template Injection (SSTI) vulnerability in a Spring Boot 3.3.4 application using Thymeleaf, leading to Remote Code Execution (RCE). It highlights the process of injecting malicious input to trigger Java reflection and bypass security defenses in modern framework.

The post provides a detailed walkthrough of achieving RCE despite the robust safeguards present, emphasizing the complexity of exploiting such vulnerabilities in contemporary applications.

📝 Contents:
● Identifying the Bug
● Facing Problems
● Bypassing the Defenses
● Developing the Exploit

https://modzero.com/en/blog/spring_boot_ssti/
👍33
🎮 Xbox 360 security in details: the long way to RGH3. Read the exclusive story about the chipless and reliable Xbox 360 modding method by 15432h

🔗https://swarm.ptsecurity.com/xbox-360-security-in-details-the-long-way-to-rgh3/
Please open Telegram to view this post
VIEW IN TELEGRAM
👍18
📟 Our researcher a1exdandy has uncovered vulnerabilities in GD32 microcontrollers (GigaDevice) that bypass protection mechanisms, allowing memory extraction.

The article 👉 https://swarm.ptsecurity.com/gigavulnerability-readout-protection-bypass-on-gigadevice-gd32-mcus/
👍28
🔥 The "impossible" XXE in PHP? Not so impossible anymore.

Our researcher Aleksandr Zhurnakov discovered an interesting combination of PHP wrappers and a feature of XML parsing in libxml2 to exploit it.

Read: https://swarm.ptsecurity.com/impossible-xxe-in-php/
👍54
Next.js and the corrupt middleware: the authorizing artifact

👤 by Rachid Allam & Yasser Allam

Researchers have discovered a critical vulnerability in Next.js, a popular framework for building web applications. The flaw allows attackers to bypass middleware responsible for request processing, including authentication and path rewrites.

By adding the x-middleware-subrequest header with a specific value, an attacker can completely ignore middleware execution, gaining unauthorized access to protected resources. Additionally, the vulnerability can be exploited for denial-of-service (DoS) attacks by poisoning the cache, leading to service disruption.

Many versions of Next.js are affected, making this a widespread security concern.

📝 Contents:
● The Next.js middleware
● The authorizing artifact artifact: old code, 0ld treasure
• Execution order and middlewareInfo.name
● The authorizing artifact: nostalgia has its charm, but living in the moment is better
• /src directory
• Max recursion depth
● Exploits
• Authorization/Rewrite bypass
• CSP bypass
• DoS via Cache-Poisoning (what?)
• Clarification
● Security Advisory - CVE-2025-29927
● Disclaimer
● Conclusion

https://zhero-web-sec.github.io/research-and-things/nextjs-and-the-corrupt-middleware
👍28
Don't Call That "Protected" Method: Dissecting an N-Day vBulletin RCE

👤 by Egidio Romano

The article analyzes a critical Unauthenticated Remote Code Execution vulnerability (CVE-2025-48827) in vBulletin, which becomes exploitable when running on PHP 8.1 or newer.

The vulnerability stems from vBulletin’s misuse of ReflectionMethod::invoke(), which in PHP 8.1+ no longer blocks access to protected methods by default. As a result, attackers can remotely trigger sensitive internal functions originally meant to be inaccessible and achieve code execution on the server.

📝 Contents:
● The Vulnerability
● The vBulletin Vulnerability
● Exploiting vBulletin: Path to Pre-Auth RCE
● Conclusion

https://karmainsecurity.com/dont-call-that-protected-method-vbulletin-rce
👍17
This media is not supported in your browser
VIEW IN TELEGRAM
⚠️ We've reproduced CVE-2025-49113 in Roundcube.

This vulnerability allows authenticated users to execute arbitrary commands via PHP object deserialization.

If you're running Roundcube — update immediately!
👍67👎2
🦊 Mozilla Foundation fixed CVE-2025-6430, discovered by our researcher Daniil Satyaev!

This vulnerability allows the Content-Disposition: attachment header to be ignored if the page is opened using <embed> or <object>, resulting in files being displayed instead of downloaded.
👍65👎5
🧠 Our researcher Sergey Tarasov discovered a vulnerability (CVE-2025-49689) in NTFS on MS Windows.

The article dives into the exploitation path, file system internals, VHD format, and more.

🔗 Read the article: https://swarm.ptsecurity.com/buried-in-the-log-exploiting-a-20-years-old-ntfs-vulnerability/
👍31
👑 Our researcher has discovered LPE in VMWare Tools (CVE-2025-22230 & CVE-2025-22247) via VGAuth!

Write-up by the one who broke it: Sergey Bliznyuk

https://swarm.ptsecurity.com/the-guest-who-could-exploiting-lpe-in-vmware-tools/
👍43
🚨 We've launched dbugs.ptsecurity.com, a new home for vulnerabilities. More than CVEs. More than MITRE.

Trends & Insights
AI-generated, multi-source vulnerability denoscriptions
Researcher credits

Explore now: https://dbugs.ptsecurity.com
👍75👎3
This media is not supported in your browser
VIEW IN TELEGRAM
📞 Microsoft fixed an authenticated RCE in Windows Telephony Service (CVE-2026-20931), discovered by our researcher Sergey Bliznyuk.

Read the write-up: https://swarm.ptsecurity.com/whos-on-the-line-exploiting-rce-in-windows-telephony-service/
👍54👎1