Skip to content

Instantly share code, notes, and snippets.

View RajChowdhury240's full-sized avatar
💻
just another learner

Raj Chowdhury RajChowdhury240

💻
just another learner
  • Confidential
  • $ aws sts get-caller-identity
  • 10:27 (UTC +11:00)
View GitHub Profile
https://www.youtube.com/watch?v=CEvIs9y1uog
version: '3.8'
services:
database:
image: mysql:8.0
container_name: woo-lucky-wheel-db
restart: always
environment:
MYSQL_ROOT_PASSWORD: rootpassword123
MYSQL_DATABASE: wordpress
title = "SSTI RCE Final Findings"
url = "/ssti-findings"
layout = "default"
==
<!DOCTYPE html>
<html>
<head>
<meta charset="utf-8">
<title>SSTI RCE Research - Final Findings</title>
<style>
title = "Final SSTI Exploit"
url = "/final-ssti"
layout = "default"
==
<!DOCTYPE html>
<html>
<head>
<meta charset="utf-8">
<title>SSTI Safe Mode Bypass - FINAL</title>
<style>
title = "Minimal SSTI Test"
url = "/minimal-ssti"
layout = "default"
==
<!DOCTYPE html>
<html>
<head>
<meta charset="utf-8">
<title>Minimal SSTI Exploitation</title>
<style>
CMS_SAFE_MODE = off

rce-proof.htm

title = "RCE Proof of Concept"
url = "/rce-proof"
layout = "default"
==
<?php

RBCD Using NXC

For this demo i will be using the machine Support from HackTheBox

image

lets resolve the domain name of the target & add it to our /etc/hosts file by :

⏺ security-vulnerability-hunter(Find additional RCE vulnerabilities) ⎿  Done (32 tool uses · 121.7k tokens · 4m 28s)

⏺ 🚨 Found Multiple Additional RCE Vulnerabilities!

I discovered 4 CRITICAL new RCE vulnerabilities beyond the original CVE. Here's the most dangerous one:


🔴 CRITICAL: Git Command Injection in GitHub Actions Integration

TYPO3 Bug Bounty Eligibility Report

Unserialize RCE Vulnerability Assessment

Date: 2026-01-15 Vulnerability: Unsafe deserialization in Registry.php and VariableFrontend.php Researcher: Your findings


✅ YES - You Can Report This Vulnerability

TYPO3 Remote Code Execution - Successful Exploitation Report

Executive Summary

REMOTE CODE EXECUTION CONFIRMED

Successfully exploited unsafe deserialization vulnerability in TYPO3 to achieve remote code execution on the target system.