Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Privilege escalation in cloudlet servers if able to break docker exec command #2075

Open
gainsley opened this issue Mar 24, 2022 · 0 comments

Comments

@gainsley
Copy link
Contributor

Users can gain access to their containers/pods by having the system to run docker exec / kubectl exec on their behalf.

There was an issue with the docker exec / kubectl exec commands that allowed a user to get access to the shell running the commands because the user input command was passed as a string directly on in the shell command string.

That was fixed by quoting the user input string, but to mitigate these kinds of attacks, we want to avoid the user getting shell access even if they somehow break out of the docker exec / kubectl exec command.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant