diff --git a/vulns_cn/configs/cap_dac_read_search-container.yaml b/vulns_cn/configs/cap_dac_read_search-container/cap_dac_read_search-container.yaml similarity index 100% rename from vulns_cn/configs/cap_dac_read_search-container.yaml rename to vulns_cn/configs/cap_dac_read_search-container/cap_dac_read_search-container.yaml diff --git a/vulns_cn/configs/cap_dac_read_search-container/init.sh b/vulns_cn/configs/cap_dac_read_search-container/init.sh new file mode 100644 index 0000000..e69de29 diff --git a/vulns_cn/configs/cap_sys_admin-container.yaml b/vulns_cn/configs/cap_sys_admin-container/cap_sys_admin-container.yaml similarity index 100% rename from vulns_cn/configs/cap_sys_admin-container.yaml rename to vulns_cn/configs/cap_sys_admin-container/cap_sys_admin-container.yaml diff --git a/vulns_cn/configs/cap_sys_admin-container/init.sh b/vulns_cn/configs/cap_sys_admin-container/init.sh new file mode 100644 index 0000000..e69de29 diff --git a/vulns_cn/configs/cap_sys_ptrace-container.yaml b/vulns_cn/configs/cap_sys_ptrace-container/cap_sys_ptrace-container.yaml similarity index 100% rename from vulns_cn/configs/cap_sys_ptrace-container.yaml rename to vulns_cn/configs/cap_sys_ptrace-container/cap_sys_ptrace-container.yaml diff --git a/vulns_cn/configs/cap_sys_ptrace-container/init.sh b/vulns_cn/configs/cap_sys_ptrace-container/init.sh new file mode 100644 index 0000000..e69de29 diff --git a/vulns_cn/configs/privileged-container/init.sh b/vulns_cn/configs/privileged-container/init.sh new file mode 100644 index 0000000..e69de29 diff --git a/vulns_cn/configs/privileged-container.yaml b/vulns_cn/configs/privileged-container/privileged-container.yaml similarity index 100% rename from vulns_cn/configs/privileged-container.yaml rename to vulns_cn/configs/privileged-container/privileged-container.yaml diff --git a/vulns_cn/docker/cve-2018-15664.yaml b/vulns_cn/docker/cve-2018-15664/cve-2018-15664.yaml similarity index 100% rename from vulns_cn/docker/cve-2018-15664.yaml rename to vulns_cn/docker/cve-2018-15664/cve-2018-15664.yaml diff --git a/vulns_cn/docker/cve-2018-15664/init.sh b/vulns_cn/docker/cve-2018-15664/init.sh new file mode 100644 index 0000000..3124941 --- /dev/null +++ b/vulns_cn/docker/cve-2018-15664/init.sh @@ -0,0 +1,8 @@ +#!/bin/bash +user=`env | grep USER=root` +container_name=${PWD##*/} +if [[ $user == "USER=root" ]];then + docker run -itd --name=$container_name ubuntu /bin/bash +else + sudo docker run -itd --name=$container_name ubuntu /bin/bash +fi \ No newline at end of file diff --git a/vulns_cn/docker/cve-2019-13139.yaml b/vulns_cn/docker/cve-2019-13139/cve-2019-13139.yaml similarity index 100% rename from vulns_cn/docker/cve-2019-13139.yaml rename to vulns_cn/docker/cve-2019-13139/cve-2019-13139.yaml diff --git a/vulns_cn/docker/cve-2019-13139/init.sh b/vulns_cn/docker/cve-2019-13139/init.sh new file mode 100644 index 0000000..e69de29 diff --git a/vulns_cn/docker/cve-2019-14271.yaml b/vulns_cn/docker/cve-2019-14271/cve-2019-14271.yaml similarity index 100% rename from vulns_cn/docker/cve-2019-14271.yaml rename to vulns_cn/docker/cve-2019-14271/cve-2019-14271.yaml diff --git a/vulns_cn/docker/cve-2019-14271/init.sh b/vulns_cn/docker/cve-2019-14271/init.sh new file mode 100644 index 0000000..3124941 --- /dev/null +++ b/vulns_cn/docker/cve-2019-14271/init.sh @@ -0,0 +1,8 @@ +#!/bin/bash +user=`env | grep USER=root` +container_name=${PWD##*/} +if [[ $user == "USER=root" ]];then + docker run -itd --name=$container_name ubuntu /bin/bash +else + sudo docker run -itd --name=$container_name ubuntu /bin/bash +fi \ No newline at end of file diff --git a/vulns_cn/docker/cve-2019-5736.yaml b/vulns_cn/docker/cve-2019-5736/cve-2019-5736.yaml similarity index 100% rename from vulns_cn/docker/cve-2019-5736.yaml rename to vulns_cn/docker/cve-2019-5736/cve-2019-5736.yaml diff --git a/vulns_cn/docker/cve-2019-5736/init.sh b/vulns_cn/docker/cve-2019-5736/init.sh new file mode 100644 index 0000000..3124941 --- /dev/null +++ b/vulns_cn/docker/cve-2019-5736/init.sh @@ -0,0 +1,8 @@ +#!/bin/bash +user=`env | grep USER=root` +container_name=${PWD##*/} +if [[ $user == "USER=root" ]];then + docker run -itd --name=$container_name ubuntu /bin/bash +else + sudo docker run -itd --name=$container_name ubuntu /bin/bash +fi \ No newline at end of file diff --git a/vulns_cn/docker/cve-2020-15257.yaml b/vulns_cn/docker/cve-2020-15257/cve-2020-15257.yaml similarity index 100% rename from vulns_cn/docker/cve-2020-15257.yaml rename to vulns_cn/docker/cve-2020-15257/cve-2020-15257.yaml diff --git a/vulns_cn/docker/cve-2020-15257/init.sh b/vulns_cn/docker/cve-2020-15257/init.sh new file mode 100755 index 0000000..391739d --- /dev/null +++ b/vulns_cn/docker/cve-2020-15257/init.sh @@ -0,0 +1,8 @@ +#!/bin/bash +user=`env | grep USER=root` +container_name=${PWD##*/} +if [[ $user == "USER=root" ]];then + docker run -itd --net=host --name=$container_name ubuntu /bin/bash +else + sudo docker run -itd --net=host --name=$container_name ubuntu /bin/bash +fi \ No newline at end of file diff --git a/vulns_cn/docker/cve-2021-30465.yaml b/vulns_cn/docker/cve-2021-30465/cve-2021-30465.yaml similarity index 61% rename from vulns_cn/docker/cve-2021-30465.yaml rename to vulns_cn/docker/cve-2021-30465/cve-2021-30465.yaml index a29d73e..635129b 100644 --- a/vulns_cn/docker/cve-2021-30465.yaml +++ b/vulns_cn/docker/cve-2021-30465/cve-2021-30465.yaml @@ -4,8 +4,16 @@ type: container_escape dependencies: - name: docker-ce version: 18.03.1 - versions: - - ~ + versions: ~ + - name: kubectl + version: 1.17.1 + versions: ~ + - name: kubelet + version: 1.17.1 + versions: ~ + - name: kubeadm + version: 1.17.1 + versions: ~ links: - https://nvd.nist.gov/vuln/detail/CVE-2021-30465 - https://github.com/advisories/GHSA-c3xm-pvg7-gh7r diff --git a/vulns_cn/docker/cve-2021-30465/init.sh b/vulns_cn/docker/cve-2021-30465/init.sh new file mode 100644 index 0000000..e69de29 diff --git a/vulns_cn/kata-containers/kata-escape-2020/init.sh b/vulns_cn/kata-containers/kata-escape-2020/init.sh new file mode 100644 index 0000000..e69de29 diff --git a/vulns_cn/kata-containers/kata-escape-2020.yaml b/vulns_cn/kata-containers/kata-escape-2020/kata-escape-2020.yaml similarity index 100% rename from vulns_cn/kata-containers/kata-escape-2020.yaml rename to vulns_cn/kata-containers/kata-escape-2020/kata-escape-2020.yaml diff --git a/vulns_cn/kernel/cve-2016-5195.yaml b/vulns_cn/kernel/cve-2016-5195/cve-2016-5195.yaml similarity index 100% rename from vulns_cn/kernel/cve-2016-5195.yaml rename to vulns_cn/kernel/cve-2016-5195/cve-2016-5195.yaml diff --git a/vulns_cn/kernel/cve-2016-5195/init.sh b/vulns_cn/kernel/cve-2016-5195/init.sh new file mode 100644 index 0000000..e69de29 diff --git a/vulns_cn/kernel/cve-2016-8655.yaml b/vulns_cn/kernel/cve-2016-8655/cve-2016-8655.yaml similarity index 100% rename from vulns_cn/kernel/cve-2016-8655.yaml rename to vulns_cn/kernel/cve-2016-8655/cve-2016-8655.yaml diff --git a/vulns_cn/kernel/cve-2016-8655/init.sh b/vulns_cn/kernel/cve-2016-8655/init.sh new file mode 100644 index 0000000..e69de29 diff --git a/vulns_cn/kernel/cve-2017-1000112.yaml b/vulns_cn/kernel/cve-2017-1000112/cve-2017-1000112.yaml similarity index 100% rename from vulns_cn/kernel/cve-2017-1000112.yaml rename to vulns_cn/kernel/cve-2017-1000112/cve-2017-1000112.yaml diff --git a/vulns_cn/kernel/cve-2017-1000112/init.sh b/vulns_cn/kernel/cve-2017-1000112/init.sh new file mode 100644 index 0000000..e69de29 diff --git a/vulns_cn/kernel/cve-2017-16995.yaml b/vulns_cn/kernel/cve-2017-16995/cve-2017-16995.yaml similarity index 100% rename from vulns_cn/kernel/cve-2017-16995.yaml rename to vulns_cn/kernel/cve-2017-16995/cve-2017-16995.yaml diff --git a/vulns_cn/kernel/cve-2017-16995/init.sh b/vulns_cn/kernel/cve-2017-16995/init.sh new file mode 100644 index 0000000..e69de29 diff --git a/vulns_cn/kernel/cve-2017-6074.yaml b/vulns_cn/kernel/cve-2017-6074/cve-2017-6074.yaml similarity index 100% rename from vulns_cn/kernel/cve-2017-6074.yaml rename to vulns_cn/kernel/cve-2017-6074/cve-2017-6074.yaml diff --git a/vulns_cn/kernel/cve-2017-6074/init.sh b/vulns_cn/kernel/cve-2017-6074/init.sh new file mode 100644 index 0000000..e69de29 diff --git a/vulns_cn/kernel/cve-2017-7308.yaml b/vulns_cn/kernel/cve-2017-7308/cve-2017-7308.yaml similarity index 100% rename from vulns_cn/kernel/cve-2017-7308.yaml rename to vulns_cn/kernel/cve-2017-7308/cve-2017-7308.yaml diff --git a/vulns_cn/kernel/cve-2017-7308/init.sh b/vulns_cn/kernel/cve-2017-7308/init.sh new file mode 100644 index 0000000..e69de29 diff --git a/vulns_cn/kernel/cve-2018-18955.yaml b/vulns_cn/kernel/cve-2018-18955/cve-2018-18955.yaml similarity index 100% rename from vulns_cn/kernel/cve-2018-18955.yaml rename to vulns_cn/kernel/cve-2018-18955/cve-2018-18955.yaml diff --git a/vulns_cn/kernel/cve-2018-18955/init.sh b/vulns_cn/kernel/cve-2018-18955/init.sh new file mode 100644 index 0000000..e69de29 diff --git a/vulns_cn/kernel/cve-2020-14386.yaml b/vulns_cn/kernel/cve-2020-14386/cve-2020-14386.yaml similarity index 100% rename from vulns_cn/kernel/cve-2020-14386.yaml rename to vulns_cn/kernel/cve-2020-14386/cve-2020-14386.yaml diff --git a/vulns_cn/kernel/cve-2020-14386/init.sh b/vulns_cn/kernel/cve-2020-14386/init.sh new file mode 100644 index 0000000..e69de29 diff --git a/vulns_cn/kernel/cve-2021-22555.yaml b/vulns_cn/kernel/cve-2021-22555/cve-2021-22555.yaml similarity index 100% rename from vulns_cn/kernel/cve-2021-22555.yaml rename to vulns_cn/kernel/cve-2021-22555/cve-2021-22555.yaml diff --git a/vulns_cn/kernel/cve-2021-22555/init.sh b/vulns_cn/kernel/cve-2021-22555/init.sh new file mode 100644 index 0000000..e69de29 diff --git a/vulns_cn/kubernetes/cve-2017-1002101/config/cve_2017_1002101_policy.yaml b/vulns_cn/kubernetes/cve-2017-1002101/config/cve_2017_1002101_policy.yaml new file mode 100644 index 0000000..ae388ae --- /dev/null +++ b/vulns_cn/kubernetes/cve-2017-1002101/config/cve_2017_1002101_policy.yaml @@ -0,0 +1,29 @@ +apiVersion: extensions/v1beta1 +kind: PodSecurityPolicy +metadata: + name: privileged + annotations: + seccomp.security.alpha.kubernetes.io/allowedProfileNames: '*' +spec: + privileged: true + allowPrivilegeEscalation: true + allowedCapabilities: + - '*' + volumes: + - '*' + allowedHostPaths: + - pathPrefix: /tmp/ + hostNetwork: true + hostPorts: + - min: 0 + max: 65535 + hostIPC: true + hostPID: true + runAsUser: + rule: 'RunAsAny' + seLinux: + rule: 'RunAsAny' + supplementalGroups: + rule: 'RunAsAny' + fsGroup: + rule: 'RunAsAny' diff --git a/vulns_cn/kubernetes/cve-2017-1002101/config/cve_2017_1002101_role.yaml b/vulns_cn/kubernetes/cve-2017-1002101/config/cve_2017_1002101_role.yaml new file mode 100644 index 0000000..fe3c907 --- /dev/null +++ b/vulns_cn/kubernetes/cve-2017-1002101/config/cve_2017_1002101_role.yaml @@ -0,0 +1,13 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + name: privileged-psp +rules: + - apiGroups: + - policy + resourceNames: + - privileged + resources: + - podsecuritypolicies + verbs: + - use diff --git a/vulns_cn/kubernetes/cve-2017-1002101/config/cve_2017_1002101_role_binding.yaml b/vulns_cn/kubernetes/cve-2017-1002101/config/cve_2017_1002101_role_binding.yaml new file mode 100644 index 0000000..01ff716 --- /dev/null +++ b/vulns_cn/kubernetes/cve-2017-1002101/config/cve_2017_1002101_role_binding.yaml @@ -0,0 +1,16 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: RoleBinding +metadata: + name: kube-system-psp + namespace: kube-system +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: privileged-psp +subjects: + - apiGroup: rbac.authorization.k8s.io + kind: Group + name: system:nodes + - apiGroup: rbac.authorization.k8s.io + kind: Group + name: system:serviceaccounts:kube-system diff --git a/vulns_cn/kubernetes/cve-2017-1002101.yaml b/vulns_cn/kubernetes/cve-2017-1002101/cve-2017-1002101.yaml similarity index 100% rename from vulns_cn/kubernetes/cve-2017-1002101.yaml rename to vulns_cn/kubernetes/cve-2017-1002101/cve-2017-1002101.yaml diff --git a/vulns_cn/kubernetes/cve-2017-1002101/init.sh b/vulns_cn/kubernetes/cve-2017-1002101/init.sh new file mode 100644 index 0000000..940518b --- /dev/null +++ b/vulns_cn/kubernetes/cve-2017-1002101/init.sh @@ -0,0 +1,24 @@ +#!/bin/bash +user=`env | grep USER=root` +if [[ $user == "USER=root" ]];then + kubectl apply -f ./config/cve_2017_1002101_policy.yaml + kubectl apply -f ./config/cve_2017_1002101_role_binding.yaml + kubectl apply -f ./config/cve_2017_1002101_role.yaml + if [[ `sudo grep PodSecurityPolicy /etc/kubernetes/manifests/kube-apiserver.yaml` ]];then + echo "The policy has been added." + else + sed -i 's/\-\-admission\-control\=/\-\-admission\-control\=PodSecurityPolicy\,/g' /etc/kubernetes/manifests/kube-apiserver.yaml + echo "Configuration finished." + fi + +else + sudo kubectl apply -f ./config/cve_2017_1002101_policy.yaml + sudo kubectl apply -f ./config/cve_2017_1002101_role_binding.yaml + sudo kubectl apply -f ./config/cve_2017_1002101_role.yaml + if [[ `sudo grep PodSecurityPolicy /etc/kubernetes/manifests/kube-apiserver.yaml` ]];then + echo "The policy has been added." + else + sudo sed -i 's/\-\-admission\-control\=/\-\-admission\-control\=PodSecurityPolicy\,/g' /etc/kubernetes/manifests/kube-apiserver.yaml + echo "Configuration finished." + fi +fi diff --git a/vulns_cn/kubernetes/cve-2018-1002105/config/cve_2018_1002105_namespace.yaml b/vulns_cn/kubernetes/cve-2018-1002105/config/cve_2018_1002105_namespace.yaml new file mode 100644 index 0000000..76ed271 --- /dev/null +++ b/vulns_cn/kubernetes/cve-2018-1002105/config/cve_2018_1002105_namespace.yaml @@ -0,0 +1,5 @@ +# cve_2018_1002105_namespace.yaml +apiVersion: v1 +kind: Namespace +metadata: + name: test diff --git a/vulns_cn/kubernetes/cve-2018-1002105/config/cve_2018_1002105_pod.yaml b/vulns_cn/kubernetes/cve-2018-1002105/config/cve_2018_1002105_pod.yaml new file mode 100644 index 0000000..d938625 --- /dev/null +++ b/vulns_cn/kubernetes/cve-2018-1002105/config/cve_2018_1002105_pod.yaml @@ -0,0 +1,16 @@ +# cve_2018_1002105_pod.yaml +apiVersion: v1 +kind: Pod +metadata: + name: test + namespace: test +spec: + containers: + - name: ubuntu + image: ubuntu:latest + imagePullPolicy: IfNotPresent + # Just spin & wait forever + command: [ "/bin/bash", "-c", "--" ] + args: [ "while true; do sleep 30; done;" ] + serviceAccount: default + serviceAccountName: default diff --git a/vulns_cn/kubernetes/cve-2018-1002105/config/cve_2018_1002105_role.yaml b/vulns_cn/kubernetes/cve-2018-1002105/config/cve_2018_1002105_role.yaml new file mode 100644 index 0000000..d72519c --- /dev/null +++ b/vulns_cn/kubernetes/cve-2018-1002105/config/cve_2018_1002105_role.yaml @@ -0,0 +1,23 @@ +# cve_2018_1002105_role.yaml +apiVersion: rbac.authorization.k8s.io/v1 +kind: Role +metadata: + name: test + namespace: test +rules: +- apiGroups: + - "" + resources: + - pods + verbs: + - get + - list + - delete + - watch +- apiGroups: + - "" + resources: + - pods/exec + verbs: + - create + - get diff --git a/vulns_cn/kubernetes/cve-2018-1002105/config/cve_2018_1002105_role_binding.yaml b/vulns_cn/kubernetes/cve-2018-1002105/config/cve_2018_1002105_role_binding.yaml new file mode 100644 index 0000000..5ec781b --- /dev/null +++ b/vulns_cn/kubernetes/cve-2018-1002105/config/cve_2018_1002105_role_binding.yaml @@ -0,0 +1,14 @@ +# cve_2018_1002105_role_binding.yaml +apiVersion: rbac.authorization.k8s.io/v1 +kind: RoleBinding +metadata: + name: test + namespace: test +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: test +subjects: +- apiGroup: rbac.authorization.k8s.io + kind: Group + name: test diff --git a/vulns_cn/kubernetes/cve-2018-1002105/config/test-token.csv b/vulns_cn/kubernetes/cve-2018-1002105/config/test-token.csv new file mode 100644 index 0000000..5398528 --- /dev/null +++ b/vulns_cn/kubernetes/cve-2018-1002105/config/test-token.csv @@ -0,0 +1 @@ +password,test,test,test diff --git a/vulns_cn/kubernetes/cve-2018-1002105.yaml b/vulns_cn/kubernetes/cve-2018-1002105/cve-2018-1002105.yaml similarity index 95% rename from vulns_cn/kubernetes/cve-2018-1002105.yaml rename to vulns_cn/kubernetes/cve-2018-1002105/cve-2018-1002105.yaml index f0294c1..758cd16 100644 --- a/vulns_cn/kubernetes/cve-2018-1002105.yaml +++ b/vulns_cn/kubernetes/cve-2018-1002105/cve-2018-1002105.yaml @@ -6,6 +6,7 @@ dependencies: version: 1.11.1 versions: ~ - name: kubelet + - name: test version: 1.11.1 versions: ~ - name: kubeadm diff --git a/vulns_cn/kubernetes/cve-2018-1002105/init.sh b/vulns_cn/kubernetes/cve-2018-1002105/init.sh new file mode 100755 index 0000000..4413eb8 --- /dev/null +++ b/vulns_cn/kubernetes/cve-2018-1002105/init.sh @@ -0,0 +1,28 @@ +#!/bin/bash +user=`env | grep USER=root` +if [[ $user == "USER=root" ]];then + kubectl apply -f ./config/cve_2018_1002105_namespace.yaml + kubectl apply -f ./config/cve_2018_1002105_role.yaml + kubectl apply -f ./config/cve_2018_1002105_role_binding.yaml + kubectl apply -f ./config/cve_2018_1002105_pod.yaml + cp ./config/test-token.csv /etc/kubernetes/pki/test-token.csv + if [[ `sudo grep test-token.csv /etc/kubernetes/manifests/kube-apiserver.yaml` ]];then + echo "The token file has been added." + else + sed -i '/\/etc\/kubernetes\/pki\/apiserver.key/a\ - --token-auth-file=\/etc\/kubernetes\/pki\/test-token.csv' /etc/kubernetes/manifests/kube-apiserver.yaml + echo "Configuration finished." + fi + +else + sudo kubectl apply -f ./config/cve_2018_1002105_namespace.yaml + sudo kubectl apply -f ./config/cve_2018_1002105_role.yaml + sudo kubectl apply -f ./config/cve_2018_1002105_role_binding.yaml + sudo kubectl apply -f ./config/cve_2018_1002105_pod.yaml + sudo cp ./config/test-token.csv /etc/kubernetes/pki/test-token.csv + if [[ `sudo grep test-token.csv /etc/kubernetes/manifests/kube-apiserver.yaml` ]];then + echo "The token file has been added." + else + sudo sed -i '/\/etc\/kubernetes\/pki\/apiserver.key/a\ - --token-auth-file=\/etc\/kubernetes\/pki\/test-token.csv' /etc/kubernetes/manifests/kube-apiserver.yaml + echo "Configuration finished." + fi +fi diff --git a/vulns_cn/kubernetes/cve-2019-11253.yaml b/vulns_cn/kubernetes/cve-2019-11253/cve-2019-11253.yaml similarity index 100% rename from vulns_cn/kubernetes/cve-2019-11253.yaml rename to vulns_cn/kubernetes/cve-2019-11253/cve-2019-11253.yaml diff --git a/vulns_cn/kubernetes/cve-2019-11253/init.sh b/vulns_cn/kubernetes/cve-2019-11253/init.sh new file mode 100644 index 0000000..e69de29 diff --git a/vulns_cn/kubernetes/cve-2019-9512.yaml b/vulns_cn/kubernetes/cve-2019-9512/cve-2019-9512.yaml similarity index 100% rename from vulns_cn/kubernetes/cve-2019-9512.yaml rename to vulns_cn/kubernetes/cve-2019-9512/cve-2019-9512.yaml diff --git a/vulns_cn/kubernetes/cve-2019-9512/init.sh b/vulns_cn/kubernetes/cve-2019-9512/init.sh new file mode 100644 index 0000000..e69de29 diff --git a/vulns_cn/kubernetes/cve-2019-9514.yaml b/vulns_cn/kubernetes/cve-2019-9514/cve-2019-9514.yaml similarity index 100% rename from vulns_cn/kubernetes/cve-2019-9514.yaml rename to vulns_cn/kubernetes/cve-2019-9514/cve-2019-9514.yaml diff --git a/vulns_cn/kubernetes/cve-2019-9514/init.sh b/vulns_cn/kubernetes/cve-2019-9514/init.sh new file mode 100644 index 0000000..e69de29 diff --git a/vulns_cn/kubernetes/cve-2019-9946.yaml b/vulns_cn/kubernetes/cve-2019-9946/cve-2019-9946.yaml similarity index 100% rename from vulns_cn/kubernetes/cve-2019-9946.yaml rename to vulns_cn/kubernetes/cve-2019-9946/cve-2019-9946.yaml diff --git a/vulns_cn/kubernetes/cve-2019-9946/init.sh b/vulns_cn/kubernetes/cve-2019-9946/init.sh new file mode 100644 index 0000000..e69de29 diff --git a/vulns_cn/kubernetes/cve-2020-8554.yaml b/vulns_cn/kubernetes/cve-2020-8554/cve-2020-8554.yaml similarity index 100% rename from vulns_cn/kubernetes/cve-2020-8554.yaml rename to vulns_cn/kubernetes/cve-2020-8554/cve-2020-8554.yaml diff --git a/vulns_cn/kubernetes/cve-2020-8554/init.sh b/vulns_cn/kubernetes/cve-2020-8554/init.sh new file mode 100644 index 0000000..e69de29 diff --git a/vulns_cn/kubernetes/cve-2020-8555.yaml b/vulns_cn/kubernetes/cve-2020-8555/cve-2020-8555.yaml similarity index 100% rename from vulns_cn/kubernetes/cve-2020-8555.yaml rename to vulns_cn/kubernetes/cve-2020-8555/cve-2020-8555.yaml diff --git a/vulns_cn/kubernetes/cve-2020-8555/init.sh b/vulns_cn/kubernetes/cve-2020-8555/init.sh new file mode 100644 index 0000000..e69de29 diff --git a/vulns_cn/kubernetes/cve-2020-8557.yaml b/vulns_cn/kubernetes/cve-2020-8557/cve-2020-8557.yaml similarity index 100% rename from vulns_cn/kubernetes/cve-2020-8557.yaml rename to vulns_cn/kubernetes/cve-2020-8557/cve-2020-8557.yaml diff --git a/vulns_cn/kubernetes/cve-2020-8557/init.sh b/vulns_cn/kubernetes/cve-2020-8557/init.sh new file mode 100644 index 0000000..e69de29 diff --git a/vulns_cn/kubernetes/cve-2020-8558.yaml b/vulns_cn/kubernetes/cve-2020-8558/cve-2020-8558.yaml similarity index 100% rename from vulns_cn/kubernetes/cve-2020-8558.yaml rename to vulns_cn/kubernetes/cve-2020-8558/cve-2020-8558.yaml diff --git a/vulns_cn/kubernetes/cve-2020-8558/init.sh b/vulns_cn/kubernetes/cve-2020-8558/init.sh new file mode 100644 index 0000000..e69de29 diff --git a/vulns_cn/kubernetes/cve-2020-8559.yaml b/vulns_cn/kubernetes/cve-2020-8559/cve-2020-8559.yaml similarity index 100% rename from vulns_cn/kubernetes/cve-2020-8559.yaml rename to vulns_cn/kubernetes/cve-2020-8559/cve-2020-8559.yaml diff --git a/vulns_cn/kubernetes/cve-2020-8559/init.sh b/vulns_cn/kubernetes/cve-2020-8559/init.sh new file mode 100644 index 0000000..e69de29 diff --git a/vulns_cn/kubernetes/cve-2021-25741.yaml b/vulns_cn/kubernetes/cve-2021-25741/cve-2021-25741.yaml similarity index 100% rename from vulns_cn/kubernetes/cve-2021-25741.yaml rename to vulns_cn/kubernetes/cve-2021-25741/cve-2021-25741.yaml diff --git a/vulns_cn/kubernetes/cve-2021-25741/init.sh b/vulns_cn/kubernetes/cve-2021-25741/init.sh new file mode 100644 index 0000000..e69de29 diff --git a/vulns_cn/mounts/mount-docker-sock/init.sh b/vulns_cn/mounts/mount-docker-sock/init.sh new file mode 100644 index 0000000..e69de29 diff --git a/vulns_cn/mounts/mount-docker-sock.yaml b/vulns_cn/mounts/mount-docker-sock/mount-docker-sock.yaml similarity index 100% rename from vulns_cn/mounts/mount-docker-sock.yaml rename to vulns_cn/mounts/mount-docker-sock/mount-docker-sock.yaml diff --git a/vulns_cn/mounts/mount-host-etc/init.sh b/vulns_cn/mounts/mount-host-etc/init.sh new file mode 100644 index 0000000..e69de29 diff --git a/vulns_cn/mounts/mount-host-etc.yaml b/vulns_cn/mounts/mount-host-etc/mount-host-etc.yaml similarity index 100% rename from vulns_cn/mounts/mount-host-etc.yaml rename to vulns_cn/mounts/mount-host-etc/mount-host-etc.yaml diff --git a/vulns_cn/mounts/mount-host-procfs/init.sh b/vulns_cn/mounts/mount-host-procfs/init.sh new file mode 100644 index 0000000..e69de29 diff --git a/vulns_cn/mounts/mount-host-procfs.yaml b/vulns_cn/mounts/mount-host-procfs/mount-host-procfs.yaml similarity index 100% rename from vulns_cn/mounts/mount-host-procfs.yaml rename to vulns_cn/mounts/mount-host-procfs/mount-host-procfs.yaml diff --git a/vulns_cn/no-vuln/no-vuln-ubuntu/init.sh b/vulns_cn/no-vuln/no-vuln-ubuntu/init.sh new file mode 100644 index 0000000..e69de29 diff --git a/vulns_cn/no-vuln/no-vuln-ubuntu.yaml b/vulns_cn/no-vuln/no-vuln-ubuntu/no-vuln-ubuntu.yaml similarity index 100% rename from vulns_cn/no-vuln/no-vuln-ubuntu.yaml rename to vulns_cn/no-vuln/no-vuln-ubuntu/no-vuln-ubuntu.yaml