You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@kapistka It's not really a big problem. If the attacker has the ability to prepare his own image, he can easily bypass these checks. I've done some simple tests and I'm ready to give a couple of examples:
Bypass malicious compliance checks. All values are hardcoded. There are many ways how you can obfuscate a bash script/path. The simplest of them is using "?", "*" symbols. So you can use rm -rf /v*r/l*b/a*t/lists/* instead rm -rf /var/lib/apt/lists/* construction.
What about malicious files detected by VirusTotal? All files that VirusTotal recognised as malicious are open source tools. In order for an executable file not to be detected by VT, it is enough to change only a byte. This in turn changes the hash and the malware is not recognised. An attacker can use a custom build of these tools.
Path obfuscation is a good point, but malicious compliance is not interesting for the attacker, because it bypasses only the vulnerability scanner. It is more interesting to bypass CVE-2024-21626.
To bypass virustotal, I would suggest using encryption, like here.
The creation date is not interesting for the attacker. This is used against the laziness of developers to download a more recent image.
We need to come up with bypass =)
The text was updated successfully, but these errors were encountered: