mirror of
https://github.com/falcosecurity/falco.git
synced 2025-06-26 22:57:24 +00:00
cleanup(rules): Directory traversal monitored file read
Signed-off-by: Melissa Kilby <melissa.kilby.oss@gmail.com>
This commit is contained in:
parent
6efc5b42f7
commit
dd49038b0d
@ -912,7 +912,10 @@
|
|||||||
items: [/boot, /lib, /lib64, /usr/lib, /usr/local/lib, /usr/local/sbin, /usr/local/bin, /root/.ssh]
|
items: [/boot, /lib, /lib64, /usr/lib, /usr/local/lib, /usr/local/sbin, /usr/local/bin, /root/.ssh]
|
||||||
|
|
||||||
- macro: user_ssh_directory
|
- macro: user_ssh_directory
|
||||||
condition: (fd.name glob '/home/*/.ssh/*')
|
condition: (fd.name contains '/.ssh/' and fd.name glob '/home/*/.ssh/*')
|
||||||
|
|
||||||
|
- macro: directory_traversal
|
||||||
|
condition: (fd.nameraw contains '../' and fd.nameraw glob '*../*../*')
|
||||||
|
|
||||||
# google_accounts_(daemon)
|
# google_accounts_(daemon)
|
||||||
- macro: google_accounts_daemon_writing_ssh
|
- macro: google_accounts_daemon_writing_ssh
|
||||||
@ -957,6 +960,19 @@
|
|||||||
priority: ERROR
|
priority: ERROR
|
||||||
tags: [filesystem, mitre_persistence]
|
tags: [filesystem, mitre_persistence]
|
||||||
|
|
||||||
|
- rule: Directory traversal monitored file read
|
||||||
|
desc: >
|
||||||
|
Web applications can be vulnerable to directory traversal attacks that allow accessing files outside of the web app's root directory (e.g. Arbitrary File Read bugs).
|
||||||
|
System directories like /etc are typically accessed via absolute paths. Access patterns outside of this (here path traversal) can be regarded as suspicious.
|
||||||
|
condition: open_read and (etc_dir or user_ssh_directory or fd.name startswith /root/.ssh or fd.name contains "id_rsa") and directory_traversal and not proc.pname in (shell_binaries)
|
||||||
|
enabled: true
|
||||||
|
output: >
|
||||||
|
Read monitored file via directory traversal (username=%user.name useruid=%user.uid user_loginuid=%user.loginuid program=%proc.name exe=%proc.exepath
|
||||||
|
command=%proc.cmdline parent=%proc.pname file=%fd.name fileraw=%fd.nameraw parent=%proc.pname
|
||||||
|
gparent=%proc.aname[2] container_id=%container.id image=%container.image.repository returncode=%evt.res cwd=%proc.cwd)
|
||||||
|
priority: WARNING
|
||||||
|
tags: [filesystem, mitre_discovery, mitre_exfiltration, mitre_credential_access]
|
||||||
|
|
||||||
# This rule is disabled by default as many system management tools
|
# This rule is disabled by default as many system management tools
|
||||||
# like ansible, etc can read these files/paths. Enable it using this macro.
|
# like ansible, etc can read these files/paths. Enable it using this macro.
|
||||||
|
|
||||||
@ -1366,19 +1382,6 @@
|
|||||||
- macro: user_known_read_sensitive_files_activities
|
- macro: user_known_read_sensitive_files_activities
|
||||||
condition: (never_true)
|
condition: (never_true)
|
||||||
|
|
||||||
- rule: Directory traversal monitored file read
|
|
||||||
desc: >
|
|
||||||
Web applications can be vulnerable to directory traversal attacks that allow accessing files outside of the web app's root directory (e.g. Arbitrary File Read bugs).
|
|
||||||
System directories like /etc are typically accessed via absolute paths. Access patterns outside of this (here path traversal) can be regarded as suspicious.
|
|
||||||
condition: open_read and (fd.directory startswith "/etc" or fd.name contains ".ssh/" or fd.name contains "id_rsa") and fd.nameraw contains "../" and fd.nameraw glob *../*../* and not proc.pname in (shell_binaries)
|
|
||||||
enabled: true
|
|
||||||
output: >
|
|
||||||
Read monitored file via directory traversal (username=%user.name useruid=%user.uid user_loginuid=%user.loginuid program=%proc.name exe=%proc.exepath
|
|
||||||
command=%proc.cmdline parent=%proc.pname file=%fd.name fileraw=%fd.nameraw parent=%proc.pname
|
|
||||||
gparent=%proc.aname[2] container_id=%container.id image=%container.image.repository returncode=%evt.res cwd=%proc.cwd)
|
|
||||||
priority: WARNING
|
|
||||||
tags: [filesystem, mitre_discovery, mitre_exfiltration, mitre_credential_access]
|
|
||||||
|
|
||||||
- rule: Read sensitive file trusted after startup
|
- rule: Read sensitive file trusted after startup
|
||||||
desc: >
|
desc: >
|
||||||
an attempt to read any sensitive file (e.g. files containing user/password/authentication
|
an attempt to read any sensitive file (e.g. files containing user/password/authentication
|
||||||
|
Loading…
Reference in New Issue
Block a user