Julien | MrTuxracer's Avatar

Julien | MrTuxracer

@mrtuxracer.bsky.social

CEO @rcesecurity.com | Full-time #BugBounty | @hacker0x01.bsky.social H1-Elite | $1,500,000 Overall Bounties | ❤️ IDA Pro | Mobile Hacker

1,227 Followers  |  84 Following  |  60 Posts  |  Joined: 09.12.2023
Posts Following

Posts by Julien | MrTuxracer (@mrtuxracer.bsky.social)

Preview
When Audits Fail Part 2: From Pre-Auth SSRF … | RCE Security A pre-auth SSRF in TRUfusion Enterprise (CVE-2025-32355) allows external attackers to reach internal-only services via a misconfigured reverse proxy. This …

Pwning TRUfusion Enterprise again: chaining a pre-auth SSRF (CVE-2025-32355), a default password, and a path traversal (CVE-2025-59793) to gain RCE.

#security

www.rcesecurity.com/2026/02/when...

16.02.2026 20:31 — 👍 1    🔁 1    💬 0    📌 0
Exploiting A Pre-Auth RCE in W3 Total Cache For WordPress (CVE-2025-9501) | RCE Security

I’ve updated my blog post about CVE-2025-9501 and included bypasses for all W3 Total Cache versions up to and including the latest 2.8.15. #wordpress #security

www.rcesecurity.com/2025/11/expl...

23.12.2025 15:25 — 👍 2    🔁 1    💬 0    📌 0
Exploiting A Pre-Auth RCE in W3 Total Cache For WordPress (CVE-2025-9501) | RCE Security

We took WPScan's one-liner #security advisory for CVE-2025-9501 affecting the W3 Total Cache plugin for #WordPress, analysed its cache parsing internals and built a pre-auth RCE exploit for it 😎

www.rcesecurity.com/2025/11/expl...

#infosec

19.11.2025 17:33 — 👍 1    🔁 2    💬 1    📌 0

I try to get Rocket Software to fix my pre-auth SSRF affecting TRUfusion for 8 months now.

Considering I'm doing this for free, and they didn't even bother to credit me last time, I feel they don't really care. Maybe I shouldn't care either and drop a 0day (+chain to RCE)...

#security

17.11.2025 20:44 — 👍 4    🔁 0    💬 0    📌 0
Security Advisories | RCE Security

Our friends @hashicorp.com released a new version of Consul fixing our reported Denial of Service vulnerabilities (CVE-2025-11374 and CVE-2025-11375).

See our official advisories for the details and remediation steps: www.rcesecurity.com/security-adv...

#security

02.11.2025 15:40 — 👍 0    🔁 1    💬 0    📌 0
Rocket Software Documentation

OK, Rocket Software believes that the likelihood of my unauthenticated RCE "being exploited is rare"...🤦‍♂️

docs.rocketsoftware.com/bundle/trufu...

#security

15.10.2025 19:18 — 👍 1    🔁 0    💬 0    📌 0

Nah, it's only been a very vivid fever dream. It never happened, for sure 😬

30.09.2025 16:02 — 👍 1    🔁 0    💬 0    📌 0
When Audits Fail: Four Critical Pre-Auth Vulnerabilities in TRUfusion Enterprise | RCE Security

Btw, here's the write-up about the cookie forgery for your pleasure 😉

www.rcesecurity.com/2025/09/when...

30.09.2025 15:52 — 👍 3    🔁 1    💬 1    📌 0
When Audits Fail: Four Critical Pre-Auth Vulnerabilities in TRUfusion Enterprise | RCE Security

Another day, another Remote Code Execution (and its 3 friends).

Pre-auth path traversal, hard-coded crypto key allowing cookie forgery, arbitrary file write, and PII disclosure in TRUfusion Enterprise (CVE-2025-27222 to CVE-2025-27225) #security

www.rcesecurity.com/2025/09/when...

30.09.2025 15:43 — 👍 4    🔁 3    💬 1    📌 0

Gosh, why the heck?!

30.08.2025 05:45 — 👍 0    🔁 0    💬 0    📌 0

Remember I wanted to drop more bugs (Pre-Auth RCE, Cookie Forgery etc.) in June?

Unfortunately, I had to postpone the disclosure because there are still too many vulnerable instances online and the vendor apparently needs to manually patch each one... 🤦‍♂️

#BugBounty #security

29.07.2025 19:45 — 👍 5    🔁 0    💬 0    📌 0

I‘d say it’s gonna be option one 🤪 Norway is one of the most beautiful countries on this planet 👌

22.07.2025 12:04 — 👍 0    🔁 0    💬 0    📌 0

"We take our freedom for granted. It’s better to pay the price of convenience and take back ownership of your data."

This is it 💯

#privacy

13.07.2025 08:25 — 👍 1    🔁 1    💬 0    📌 0
Preview
Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812) - Help Net Security Threat actors are actively exploiting a recently fixed remote code execution vulnerability (CVE-2025-47812) in Wing FTP Server.

Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812)

📖 Read more: www.helpnetsecurity.com/2025/07/11/c...

#cybersecurity #cybersecuritynews #exploit #filesharing @censys.bsky.social @rcesecurity.com @mrtuxracer.bsky.social

11.07.2025 12:42 — 👍 1    🔁 1    💬 0    📌 0

Yeah, I mean it really depends how you’re using it. Personally, Notion was more of an overpriced idea dump with project management for me. So switching it to Stackfield wasn’t that much of a change 🤷‍♂️

10.07.2025 16:48 — 👍 1    🔁 0    💬 1    📌 0

Although self-hosted Obsidian would do it too 👍

10.07.2025 15:59 — 👍 1    🔁 0    💬 0    📌 0

I‘m abusing my Stackfield instance for that 😏

10.07.2025 15:46 — 👍 1    🔁 0    💬 1    📌 0

In terms of that, big shout-out to @proton.me for their stance on #privacy and for their Mail/Drive/Pass products that are a perfect alternative to some of these products! Cheers guys! Appreciate your hard work!

10.07.2025 14:49 — 👍 1    🔁 0    💬 0    📌 0
Preview
Homepage | European Alternatives We help you find European alternatives for digital service and products, like cloud services and SaaS products.

I am a huge fan of the #BuyFromEU movement! So far, I've ditched a lot of US stuff already, including Microsoft, Dropbox, 1Password, Notion, Grammarly, Amazon, Slack, and Google.

This helped a lot: european-alternatives.eu

10.07.2025 14:28 — 👍 10    🔁 5    💬 3    📌 2
Preview
Managing newsletters in Proton Mail | Proton Learn how to easily manage email subscriptions in Proton Mail’s newsletters section. Unsubscribe, organize, and declutter your inbox in just a few clicks.

Good that @proton.me has this feature already 👌

proton.me/support/mail...

09.07.2025 11:27 — 👍 49    🔁 4    💬 0    📌 0

Here's an update to the blog post about CVE-2025-47812, which now includes a way to leak a user's password (CVE-2025-27889), but requires a bit of social engineering.

#security #BugBounty

03.07.2025 15:14 — 👍 6    🔁 0    💬 0    📌 0

As promised! Here's a root/SYSTEM-level RCE (aka CVE-2025-47812) affecting Wing FTP Server in versions before 7.4.4.

Enjoy 🥷

#security #BugBounty

30.06.2025 19:43 — 👍 5    🔁 1    💬 0    📌 0

I'll publish 4 CVEs later today, including one unauthenticated Root/SYSTEM-level RCE.

I'm a bit nervous, TBH, because it potentially affects 15k systems on the internet. But, according to the vendor, most instances should've been updated already 😬

30.06.2025 08:47 — 👍 6    🔁 0    💬 0    📌 0

I don’t know why, but this has some very strong jonathandata vibes 😬

25.06.2025 05:52 — 👍 3    🔁 0    💬 1    📌 0

A missing SPF record chained with sending an email leading to critical content injection? 🤯

14.06.2025 04:54 — 👍 2    🔁 0    💬 1    📌 0

Yeah, I love him too!

11.06.2025 14:59 — 👍 2    🔁 0    💬 0    📌 0

Yep, he does this stuff 👍

10.06.2025 15:54 — 👍 2    🔁 0    💬 2    📌 0

❤️

06.06.2025 16:55 — 👍 0    🔁 0    💬 0    📌 0

Totally understandable 😬

It caused a long sequence of WTFs on my face when I found it.

06.06.2025 16:54 — 👍 1    🔁 0    💬 0    📌 0

I have plenty of public disclosures planned for June:

2x RCE (one as root!),
Full SSRF,
Directory traversal,
Cookie forgery leading to auth bypass,
Multiple information disclosures incl. PII
Link injection leaking clear-text passwords

All pre-auth 🙃

#security #BugBounty

06.06.2025 16:37 — 👍 19    🔁 0    💬 3    📌 0