Skip to content

Commit 9d36827

Browse files
darryk10poiana
authored andcommitted
Added rule to detect CVE-2019-5736
Co-authored-by: wcc526 <[email protected]> Signed-off-by: darryk10 <[email protected]>
1 parent bd6e507 commit 9d36827

File tree

1 file changed

+15
-0
lines changed

1 file changed

+15
-0
lines changed

rules/falco_rules.yaml

+15
Original file line numberDiff line numberDiff line change
@@ -3199,6 +3199,21 @@
31993199
priority: CRITICAL
32003200
tags: [mitre_initial_access]
32013201

3202+
- list: docker_binaries
3203+
items: [dockerd, containerd-shim, "runc:[1:CHILD]", pause]
3204+
3205+
- macro: docker_procs
3206+
condition: proc.name in (docker_binaries)
3207+
3208+
- rule: Modify Container Entrypoint
3209+
desc: This rule detect an attempt to write on container entrypoint symlink (/proc/self/exe). Possible CVE-2019-5736 Container Breakout exploitation attempt.
3210+
condition: >
3211+
open_write and container and (fd.name=/proc/self/exe or fd.name startswith /proc/self/fd/) and not docker_procs and not proc.cmdline = "runc:[1:CHILD] init"
3212+
output: >
3213+
Detect Potential Container Breakout Exploit (CVE-2019-5736) (user=%user.name process=%proc.name file=%fd.name cmdline=%proc.cmdline %container.info)
3214+
priority: WARNING
3215+
tags: [container, filesystem, mitre_initial_access]
3216+
32023217
# Application rules have moved to application_rules.yaml. Please look
32033218
# there if you want to enable them by adding to
32043219
# falco_rules.local.yaml.

0 commit comments

Comments
 (0)