Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

My mind immediately went to chaining this with another recent vulnerability in the Ninja Forms - File Upload plugin [0]

> This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

So, upload and execute a script that loads Copy Fail and even if you're only executing as www-data or another restricted user that "can't" sudo -- suddenly, uid=0!

To repeat the refrain... I'm so tired.

[0] https://www.wordfence.com/blog/2026/04/attackers-actively-ex...



Yes but what I'm saying is that copy.fail is a minor detail in this scenario.

If you are running Ninja Forums you need to run it in its own VM so that if it gets compromised _you don't care if it has uid=0_.

You need to do that regardless of copy.fail. Now that you've patched copy.fail, there are loads and loads of other vulns that can be used the same way.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: