mirror of
https://github.com/falcosecurity/falco.git
synced 2025-09-16 06:48:31 +00:00
Don't let databases spawn processes after startup.
This will detect the result of some sql injection attacks where the injected query tries to spawn a process. We don't include web servers in this list for now due to things like mod_perl, mod_php, etc. Maybe we can add it once we make exceptions for those modules.
This commit is contained in:
@@ -38,6 +38,8 @@
|
||||
- macro: modify
|
||||
condition: rename or mkdir or remove
|
||||
|
||||
- macro: spawn_process
|
||||
condition: syscall.type = execve
|
||||
|
||||
# File categories
|
||||
- macro: terminal_file_fd
|
||||
@@ -177,6 +179,11 @@
|
||||
output: "Read sensitive file after startup (%user.name %proc.name %evt.dir %evt.type %evt.args %fd.name)"
|
||||
priority: WARNING
|
||||
|
||||
# Don't let databases spawn processes (i.e. workers) after startup.
|
||||
- condition: db_server_binaries and not proc_is_new and spawn_process
|
||||
output: "Read sensitive file after startup (%user.name %proc.name %evt.dir %evt.type %evt.args %fd.name)"
|
||||
priority: WARNING
|
||||
|
||||
# Don't modify binary dirs
|
||||
- condition: modify and (bin_dir_rename or bin_dir_mkdir)
|
||||
output: "Modify bin dir (%user.name %proc.name %evt.dir %evt.type %evt.args %fd.name)"
|
||||
|
Reference in New Issue
Block a user