@stuub

255 posts

@stuub banner
@stuub

@stuub

@stuub_

breaks things | makes things that breaks things | https://t.co/NdhhKFYLYm

0x7f.1 Katılım Ekim 2019
195 Takip Edilen368 Takipçiler
@stuub
@stuub@stuub_·
@intigriti SQLi -> outfile webshell was my first on a live host 1st publicly disclosed was CVE-2026-5760 tho :P
English
0
0
1
34
Intigriti
Intigriti@intigriti·
how did you find your first remote code execution vulnerability? 😎
English
28
0
55
8.4K
DmarketSnipes
DmarketSnipes@DMarketSnipes·
Yeah that’s probably the biggest flaw tbh. Two nearly identical pulls can have completely different values just because one was redeemed earlier/later on the curve. That feels pretty weird compared to normal market pricing where supply/demand decides value. But I also kinda get why Valve is experimenting with this model — probably trying to distance themselves from classic loot box mechanics with all the EU regulation pressure around gambling systems.
English
1
0
0
348
Anco
Anco@Anco_CS2·
Got my first gold from the new terminal. Valve is asking 70 euro OVER STEAM MARKET PRICE... WTF VALVE? IS SOMEONE JOKING WITH ME?
Anco tweet mediaAnco tweet media
English
51
11
1.5K
225.6K
@stuub
@stuub@stuub_·
Woke up to find my latest CVE (CVE-2026-5760) showcased in Mental Outlaw's newest video :D mom, i'm on tv! youtube.com/watch?v=u3XlqK…
YouTube video
YouTube
English
0
0
0
67
@stuub
@stuub@stuub_·
@foxbook Thank you for sharing my research :)
English
0
0
1
11
キタきつね
キタきつね@foxbook·
SGLang CVE-2026-5760 (CVSS 9.8) 悪意のあるGGUFモデルファイルを介してリモートコード実行が可能になる SGLang CVE-2026-5760 (CVSS 9.8) Enables RCE via Malicious GGUF Model Files #HackerNews (Apr 20) thehackernews.com/2026/04/sglang…
日本語
1
0
1
232
@stuub
@stuub@stuub_·
@Dinosn Thanks for sharing my research :)
English
0
0
0
17
Lucas
Lucas@lucasverdan·
🛑 SGLang CVE-2026-5760 turns malicious GGUF models into RCE CERT/CC says SGLang CVE-2026-5760 can turn malicious GGUF model files into remote code exec… 🔗 Details → invaders.ie/resources/blog…
Indonesia
1
1
1
225
@stuub
@stuub@stuub_·
@lucasverdan Great writeup! Thank you for sharing my research Lucas :)
English
0
0
1
11
@stuub
@stuub@stuub_·
@tomoaxe Thanks for sharing my research!
English
0
0
1
14
nakamura
nakamura@tomoaxe·
chat_templateに悪意ある仕込みって、こんなところも攻撃経路なるのか。。。 SGLang CVE-2026-5760 (CVSS 9.8) — 悪意あるGGUFモデルファイルでRCE thehackernews.com/2026/04/sglang…
日本語
1
0
1
360
SecureChap
SecureChap@SecureChap·
SGLang's /v1/rerank endpoint executes arbitrary code from model files. CVE-2026-5760 affects the open-source LLM serving framework. CVSS 9.8. Reported by Stuart Beck and disclosed April 20, 2026 via CERT/CC. The vulnerable code sits in entrypoints/openai/serving_rerank.py. SGLang loads tokenizer.chat_template from GGUF models and renders it using jinja2.Environment() - an unsandboxed templating engine. Attacker crafts a malicious GGUF with a Jinja2 SSTI payload in the chat_template, uploads it to Hugging Face. Victim integrates the model into their SGLang setup. Unauthenticated POST to /v1/rerank forces rendering of the tainted chat_template. Server-side Python execution follows immediately. Exploitation hinges on Qwen3 reranker chat template phrasing. Maintainers ignored coordinated disclosure. No patch released. Swap to ImmutableSandboxedEnvironment for mitigation. A .gguf file blurs the line between data and code when loaders skip sandboxing.
English
1
0
1
86
@stuub
@stuub@stuub_·
@TheHackersNews Thanks for highlighting my research! Appreciate you leaving credit in the article too :)
English
0
0
0
59
@stuub retweetledi
The Hacker News
The Hacker News@TheHackersNews·
⚠️ SGLang has a critical flaw enabling remote code execution (CVSS 9.8) via malicious GGUF model files. A crafted Jinja2 template runs when /v1/rerank is triggered, executing attacker code on the server. 🔗 How GGUF templates become an RCE path → thehackernews.com/2026/04/sglang…
English
3
8
38
9.7K
@stuub
@stuub@stuub_·
@evildojo666 @rez0__ print(“money”) Done. thanks for coming to my BSides xitter conference I’ll see myself out
English
0
0
1
20
darkmage
darkmage@evildojo666·
@rez0__ You wanna give me $200 a month? :) I'd like to print money as well.
English
2
0
0
242
@stuub
@stuub@stuub_·
@fattselimi @intigriti Yup… 3 reports pending on intigriti, 8 days now and no response. Sucks as I’ve got a crit in my draft that I can’t send until a report closes :/
English
0
0
0
174
Fat
Fat@fattselimi·
I just noticed that i have a report in Triage queue at @intigriti which is 15 days old wtf this never happend before AI garbage reports are filling the queue with useless submissions
English
14
1
110
6.3K
@stuub
@stuub@stuub_·
@hetmehtaa Time to escalate to ATO -> Arbitrary file upload -> RCE -> write and apply the patch for them locally 😇
English
0
0
8
1.3K
Het Mehta
Het Mehta@hetmehtaa·
tried to do a responsible disclosure today found a reflected XSS on a company’s login page emailed their security team no response emailed again no response checked if they had a security.txt file they did not checked their website footer for a contact found “webmaster@company.com” emailed that got an automated reply asking if i want to subscribe to their newsletter i said yes i am now receiving weekly product updates from a company whose login page has XSS i feel this is not how responsible disclosure is supposed to work i have read all their newsletters their Q3 webinar looks interesting
English
7
0
83
10.7K
@stuub
@stuub@stuub_·
@CyberMehul @Jhaddix Perhaps I’m too lazy for every vuln type but I’ve also grown a huge fan of just walking through sites like a user in the past year. Testing the dark corners of large scope targets can be fruitful but you also have to question the perceived impact of such an area without a chain
English
1
0
1
36
Mehul Panchal
Mehul Panchal@CyberMehul·
Treat it like a pentest, is what I learned from JS0N's TBHM. Checklists. Test every function. Every parameter. Every vuln type. Small scope? Do it by hand, not python. (My geek brain thinks it's counterproductive, but it's not.) @Jhaddix is a legend.
xssdoctor@xssdoctor

About a year and a half into my hacking journey, I was pretty bummed out. I had done so much work and learned so much, but I wasn’t finding any bugs. I decided to do something drastic, and I sent a discord message to a hacking legend, @Jhaddix

English
1
1
12
1.1K