Discussion
Loading...

Post

  • About
  • Code of conduct
  • Privacy
  • About Bonfire
Aral Balkan
@aral@mastodon.ar.al  ·  activity timestamp 4 days ago

RE: https://infosec.exchange/@patrickcmiller/116497719012673276

“The realistic threat chain looks like this. An attacker exploits a known WordPress plugin vulnerability and gets shell access as www-data. They run the copy.fail PoC. They are now root on the host. Every other tenant is suddenly reachable, in the way I walked through in this hack post-mortem. The vulnerability does not get the attacker onto the box; it changes what happens in the next ten seconds after they land there.”

#CopyFail #linux #exploit

  • Copy link
  • Flag this post
  • Block
Log in

Bonfire social

Bonfire social: About · Code of conduct · Privacy ·
Bonfire social · 1.0.0-rc.3.6 no JS en
Automatic federation enabled
  • Explore
  • About
  • Code of Conduct
Home
Login