Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> This sounds terrible.

Well it is. Most production web sites today are exploitable because of this.

It's even worse than it sounds.



> Most production web sites today are exploitable because of this.

How so? To exploit this, you need to already have RCE on a container. But generally you get that RCE by exploiting the site (the application code) in the first place.

In which scenario does an attacker have code execution privileges in a container, but needs this root privilege to exploit the site?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: