mirror of
https://github.com/falcosecurity/falco.git
synced 2025-06-27 07:07:23 +00:00
Fixed CVE number
Signed-off-by: darryk10 <stefano.chierici@sysdig.com> Co-authored-by: Lorenzo Susini <susinilorenzo1@gmail.com>
This commit is contained in:
parent
24bd1abc43
commit
2e2b13236b
@ -3165,14 +3165,14 @@
|
||||
priority: CRITICAL
|
||||
tags: [process, mitre_privilege_escalation]
|
||||
|
||||
# This rule helps detect CVE-2022-4092:
|
||||
# This rule helps detect CVE-2022-0492:
|
||||
# A privilege escalation container escaping in cgroup
|
||||
- rule: Linux Cgroup Container Escape Vulnerability (CVE-2022-4092)
|
||||
- rule: Linux Cgroup Container Escape Vulnerability (CVE-2022-0492)
|
||||
desc: "Detect an attempt to exploit a container escape vulnerability in the Linux Kernel (CVE-2022-0492). By running a container with certains capabilities, a privileged user can modify release_agent file and escape from the container"
|
||||
condition:
|
||||
open_write and fd.name endswith release_agent and (user.uid=0 or thread.cap_permitted contains CAP_DAC_OVERRIDE) and excessively_capable_container
|
||||
output:
|
||||
"Detect cgroup container escaping attempt (CVE-2022-4092) (user=%user.name user_loginuid=%user.loginuid filename=%fd.name %container.info image=%container.image.repository:%container.image.tag cap_permitted=%thread.cap_permitted)"
|
||||
"Detect cgroup container escaping attempt (CVE-2022-0492) (user=%user.name user_loginuid=%user.loginuid filename=%fd.name %container.info image=%container.image.repository:%container.image.tag cap_permitted=%thread.cap_permitted)"
|
||||
priority: CRITICAL
|
||||
tags: [container, mitre_privilege_escalation, mitre_lateral_movement]
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user