yu5k3 Profile Banner
Mikhail Shcherbakov Profile
Mikhail Shcherbakov

@yu5k3

Followers
948
Following
1K
Media
54
Statuses
472

Doing security research. For fun and profit...

Stockholm, Sverige
Joined October 2014
Don't wanna be here? Send us removal request.
@yu5k3
Mikhail Shcherbakov
9 days
RT @0a_yso: Parsed 12k+ bug-bounty write-ups & blogs (and counting 24/7) and mapped each to CWE + language. Quick hits:.• ~60% of RCEs happ….
0
22
0
@yu5k3
Mikhail Shcherbakov
28 days
RT @J0R1AN: Small tip for the JavaScript reverse engineers out there, Chrome has a `debug()` function which triggers a breakpoint whenever….
0
39
0
@yu5k3
Mikhail Shcherbakov
30 days
RT @yu5k3: Reply if you want the list of resources that I used to dev my own Chrome RCE exploit. Might write a thread if there's interest.….
0
1
0
@yu5k3
Mikhail Shcherbakov
1 month
Reply if you want the list of resources that I used to dev my own Chrome RCE exploit. Might write a thread if there's interest. Also, if you have an SSRF in Chrome 134 in a BBP, DM me. It could be a great collab to turn the report into a full RCE 🤝.
3
1
4
@yu5k3
Mikhail Shcherbakov
1 month
- Open-source repo = easy diffs for n-days.- Regression tests (if you're lucky) help a lot.- Controlled JS = powerful primitives, e.g., heap- & jit- spraying.- V8 sandbox adds that spicy edge 🌶️.
1
0
2
@yu5k3
Mikhail Shcherbakov
1 month
I played with Chrome vulns back in Jan, mostly trying to reproduce n-days. In May, I found promising targets and developed an RCE from scratch to reverse shell in Chromium 134. Low-level exploits are real fun 🔥 and Chromium is an awesome playground for them:.
1
0
0
@yu5k3
Mikhail Shcherbakov
1 month
🤓 2025 YTD #BugBounty stats update, May:. 📄 11 issues Reported (4 Crit, 2 High, 5 Medium).💰 9 issues Paid. A new month means 2 more RCEs reported 👌.This time I hit Chromium headless browser for the first time in BBPs.
@yu5k3
Mikhail Shcherbakov
2 months
👌 2025 YTD #BugBounty stats update, April:. 📄 9 issues Reported (2 Crit, 2 High, 5 Medium).💰 8 issues Paid. Switched to monthly updates instead of weekly. Why? I don't drop new vulns every week 😅 My stats from the last months confirm my "capacity": ~2 RCEs per month.
1
0
2
@yu5k3
Mikhail Shcherbakov
2 months
RT @seanhn: I wrote-up how I used o3 to find CVE-2025-37899, a remote zeroday vulnerability in the Linux kernel’s SMB implementation. Link….
0
187
0
@yu5k3
Mikhail Shcherbakov
2 months
So yeah, I've started thinking about switching back to industry and ending the full-time BB experiment. Don't be surprised if that happens in the next couple of months, it'll just mean the dark side with cookies and performance reviews won this round 😅.
0
0
1
@yu5k3
Mikhail Shcherbakov
2 months
Hitting my Q1 milestone of earning the same as I would've by signing my last job offer definitely gives me motivation to push even harder. That said, my current efforts haven't led to any big breakthroughs in my BB methodology.
1
0
1
@yu5k3
Mikhail Shcherbakov
2 months
Still, it opens up more opportunities that I'm trying to take advantage of. I'm investing time into researching new types of attacks and building out automation. This is really the kind of life I enjoy: taking risks and being fully responsible for everything that happens!.
1
0
0
@yu5k3
Mikhail Shcherbakov
2 months
The first financial goal, reaching income comparable to a full-time IT job, is achieved!. Two RCEs with a bit of "collateral damage" per month has been enough to make it work, though I won't lie, it's way more stressful.
1
0
0
@yu5k3
Mikhail Shcherbakov
2 months
In April, I reported 2 #RCE (consistency 😎), and once again, one of them was classified as Medium. Fine, move on. Many previously reported vulns also got paid this month 💸 . I've been doing BB full-time since late last year, so it's a good moment to sum things up.
1
0
0
@yu5k3
Mikhail Shcherbakov
2 months
If I have extra time, I go through old notes and mine a few more, usually with less critical severity. As you can see, some RCEs end up being classified as Medium due to BBP restrictions. but even then, the bounties were not too bad.
1
0
0
@yu5k3
Mikhail Shcherbakov
2 months
👌 2025 YTD #BugBounty stats update, April:. 📄 9 issues Reported (2 Crit, 2 High, 5 Medium).💰 8 issues Paid. Switched to monthly updates instead of weekly. Why? I don't drop new vulns every week 😅 My stats from the last months confirm my "capacity": ~2 RCEs per month.
@yu5k3
Mikhail Shcherbakov
3 months
🫡 2025 YTD #BugBounty stats update, March:. 📄 7 issues Reported (2 Crit, 1 High, 4 Medium).💰 2 issues Paid. Reported 2 RCEs and some "collateral damage" for March. Still investigating new targets and developing my own tools.
2
0
4
@yu5k3
Mikhail Shcherbakov
2 months
RCE in Elastic Kibana via Prototype Pollution (CVSS 9.9) 🚀.
@CVEnew
CVE
4 months
CVE-2025-25015 Prototype pollution in Kibana leads to arbitrary code execution via a crafted file upload and specifically crafted HTTP requests. In Kibana versions >= 8.15.0 and < 8…
0
0
2
@yu5k3
Mikhail Shcherbakov
2 months
RCE in Elastic Kibana via Prototype Pollution (CVSS 8.7) 🤔 Curious about the A:N in the vector for the RCE. typo or did I miss something?.
@CVEnew
CVE
3 months
CVE-2024-12556 Prototype Pollution in Kibana can lead to code injection via unrestricted file upload combined with path traversal.
1
0
1
@yu5k3
Mikhail Shcherbakov
2 months
Unrestricted File Upload in Elastic Kibana (CVSS 5.4). Part of another chain ending in XSS and showing ATO impact. I shared some details at my last DEF CON, but the deep dive is still in the vault. Looks like I've hoarded enough CVEs for the next talk 😅.
@CVEnew
CVE
2 months
CVE-2024-11390 Unrestricted upload of a file with dangerous type in Kibana can lead to arbitrary JavaScript execution in a victim’s browser (XSS) via crafted HTML and JavaScript fil…
1
0
0
@yu5k3
Mikhail Shcherbakov
2 months
Unrestricted File Upload in Elastic Kibana. Part of the most beautiful and non-trivial chain I've built. I'm excited to get a chance to share the full story in a con talk someday 🤞.
@CVEnew
CVE
2 months
CVE-2025-25016 Unrestricted file upload in Kibana allows an authenticated attacker to compromise software integrity by uploading a crafted malicious file due to insufficient server-…
1
0
0
@yu5k3
Mikhail Shcherbakov
2 months
RCE in Elastic Kibana via Prototype Pollution (CVSS 9.1) 🔥.
@CVEnew
CVE
2 months
CVE-2025-25014 A Prototype pollution vulnerability in Kibana leads to arbitrary code execution via crafted HTTP requests to machine learning and reporting endpoints.
1
0
0