Michael Stepankin

293 posts

Michael Stepankin

Michael Stepankin

@artsploit

Security Researcher at @GHSecurityLab

London, England Katılım Temmuz 2014
569 Takip Edilen7K Takipçiler
Michael Stepankin
Michael Stepankin@artsploit·
Prompt injections are a serious concern for VS Code Copilot Agent. Discover how attackers can create GitHub issues with harmful instructions and find out how to protect the coding agent effectively. github.blog/security/vulne…
English
0
6
9
1.4K
Michael Stepankin retweetledi
watchTowr
watchTowr@watchtowrcyber·
The industry is ablaze w speculation around yesterday's publicly disclosed Veeam Software Backup & Replication RCE vulnerabilities (CVE-2025-23120). We reported these vulnerabilities to Veeam in early February, tracked as WT-2025-0014 and WT-2025-0015. labs.watchtowr.com/by-executive-o…
English
4
55
170
23.4K
Sam Curry
Sam Curry@samwcyo·
New blog post with @infosec_au: We found a vulnerability in Subaru where an attacker, with just a license plate, could retrieve the full location history, unlock, and start vehicles remotely. The issue was reported and patched. Full post here: samcurry.net/hacking-subaru
English
47
313
1K
117.5K
Michael Stepankin
Michael Stepankin@artsploit·
Last year, I committed to uncovering critical vulnerabilities in Maven repositories. Now it’s time to share the findings: RCE in Sonatype Nexus, Cache Poisoning in JFrog Artifactory, and more! Read it all below 🧵
Michael Stepankin tweet media
English
7
81
297
30K
Michael Stepankin
Michael Stepankin@artsploit·
Just submitted a CFP to @ekoparty where I want to talk about breaking Maven repository managers. This is the one of the craziest and fruitful research projects I've done in my career.
English
3
3
43
3.5K
Michael Stepankin retweetledi
Martin Doyhenard
Martin Doyhenard@tincho_508·
So happy to had the chance to present for second time at #BlackHat USA! I’m already receiving a lot of messages from people using these techniques to get some nice bounties! If you want to learn more about cache exploitation, the research is available at portswigger.net/research/gotta…
English
3
58
224
36.3K
Michael Stepankin retweetledi
Source Incite
Source Incite@sourceincite·
Time to retire some content! JNDI Injection Remote Code Execution via Path Manipulation in MemoryUserDatabaseFactory: srcincite.io/blog/2024/07/2…
English
0
45
140
18K
Michael Stepankin retweetledi
GitHub Security Lab
GitHub Security Lab@GHSecurityLab·
🚨 New Blog Alert! 🚨 Can an attacker execute commands by sending JSON? Learn how unsafe deserialization vulnerabilities in Ruby can be exploited and how they can be detected with CodeQL. 🔗 Read the full post: github.blog/2024-06-20-exe… Stay safe and code responsibly! 🛡️💻
English
0
20
46
5K
Michael Stepankin retweetledi
Charles Fol
Charles Fol@cfreal_·
The first part of the blog series: #Iconv, set the charset to RCE. We'll use #PHP filters and #CVE-2024-2961 to get a very stable code execution exploit from a file read primitive. #cnext
Ambionics Security@ambionics

Iconv, set the charset to RCE: in the first blog post of this series, @cfreal_ will show a new exploitation vector to get RCE in PHP from a file read primitive, using a bug in iconv() (CVE-2024-2961) ambionics.io/blog/iconv-cve…

English
8
58
170
30.2K
Michael Stepankin retweetledi
Man Yue Mo
Man Yue Mo@mmolgtm·
In this post I'll use CVE-2023-6241, a vulnerability in the Arm Mali GPU that I reported last November to gain arbitrary kernel code execution from an untrusted app on a Pixel 8 with MTE enabled. github.blog/2024-03-18-gai…
English
8
147
411
97K
Michael Stepankin retweetledi
shubs
shubs@infosec_au·
The SSRF/auth bypass affecting Ivanti Pulse Connect Secure (CVE-2024-21893), is a great example of what can be achieved with a fully blind SSRF vulnerability (RCE). Read the @assetnote blog here which includes a reliable payload and generation steps: assetnote.io/resources/rese…
English
3
88
352
32.7K
Michael Stepankin retweetledi
Man Yue Mo
Man Yue Mo@mmolgtm·
In this post I'll use CVE-2023-4069, a type confusion bug in the Maglev JIT compiler of Chrome that I reported in July, to gain RCE in the Chrome renderer sandbox: github.blog/2023-10-17-get…
English
6
100
312
57.7K
Michael Stepankin retweetledi
Kev
Kev@kevin_backhouse·
Video of my PoC for CVE-2023-43641: out-of-bounds array access in libcue. libcue is used by tracker-miners, which automatically scans new files in ~/Downloads, so the bug is triggered by downloading a file.
English
8
107
376
128.6K