Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Empty file.
Empty file.
Empty file.
Empty file.
8 changes: 8 additions & 0 deletions vulns_cn/docker/cve-2018-15664/init.sh
Original file line number Diff line number Diff line change
@@ -0,0 +1,8 @@
#!/bin/bash
user=`env | grep USER=root`
container_name=${PWD##*/}
if [[ $user == "USER=root" ]];then
docker run -itd --name=$container_name ubuntu /bin/bash
else
sudo docker run -itd --name=$container_name ubuntu /bin/bash
fi
Empty file.
8 changes: 8 additions & 0 deletions vulns_cn/docker/cve-2019-14271/init.sh
Original file line number Diff line number Diff line change
@@ -0,0 +1,8 @@
#!/bin/bash
user=`env | grep USER=root`
container_name=${PWD##*/}
if [[ $user == "USER=root" ]];then
docker run -itd --name=$container_name ubuntu /bin/bash
else
sudo docker run -itd --name=$container_name ubuntu /bin/bash
fi
8 changes: 8 additions & 0 deletions vulns_cn/docker/cve-2019-5736/init.sh
Original file line number Diff line number Diff line change
@@ -0,0 +1,8 @@
#!/bin/bash
user=`env | grep USER=root`
container_name=${PWD##*/}
if [[ $user == "USER=root" ]];then
docker run -itd --name=$container_name ubuntu /bin/bash
else
sudo docker run -itd --name=$container_name ubuntu /bin/bash
fi
8 changes: 8 additions & 0 deletions vulns_cn/docker/cve-2020-15257/init.sh
Original file line number Diff line number Diff line change
@@ -0,0 +1,8 @@
#!/bin/bash
user=`env | grep USER=root`
container_name=${PWD##*/}
if [[ $user == "USER=root" ]];then
docker run -itd --net=host --name=$container_name ubuntu /bin/bash
else
sudo docker run -itd --net=host --name=$container_name ubuntu /bin/bash
fi
Original file line number Diff line number Diff line change
Expand Up @@ -4,8 +4,16 @@ type: container_escape
dependencies:
- name: docker-ce
version: 18.03.1
versions:
- ~
versions: ~
- name: kubectl
version: 1.17.1
versions: ~
- name: kubelet
version: 1.17.1
versions: ~
- name: kubeadm
version: 1.17.1
versions: ~
links:
- https://nvd.nist.gov/vuln/detail/CVE-2021-30465
- https://github.com/advisories/GHSA-c3xm-pvg7-gh7r
Expand Down
Empty file.
Empty file.
Empty file.
Empty file.
Empty file.
Empty file.
Empty file.
Empty file.
Empty file.
Empty file.
Empty file.
Original file line number Diff line number Diff line change
@@ -0,0 +1,29 @@
apiVersion: extensions/v1beta1
kind: PodSecurityPolicy
metadata:
name: privileged
annotations:
seccomp.security.alpha.kubernetes.io/allowedProfileNames: '*'
spec:
privileged: true
allowPrivilegeEscalation: true
allowedCapabilities:
- '*'
volumes:
- '*'
allowedHostPaths:
- pathPrefix: /tmp/
hostNetwork: true
hostPorts:
- min: 0
max: 65535
hostIPC: true
hostPID: true
runAsUser:
rule: 'RunAsAny'
seLinux:
rule: 'RunAsAny'
supplementalGroups:
rule: 'RunAsAny'
fsGroup:
rule: 'RunAsAny'
Original file line number Diff line number Diff line change
@@ -0,0 +1,13 @@
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: privileged-psp
rules:
- apiGroups:
- policy
resourceNames:
- privileged
resources:
- podsecuritypolicies
verbs:
- use
Original file line number Diff line number Diff line change
@@ -0,0 +1,16 @@
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: kube-system-psp
namespace: kube-system
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: privileged-psp
subjects:
- apiGroup: rbac.authorization.k8s.io
kind: Group
name: system:nodes
- apiGroup: rbac.authorization.k8s.io
kind: Group
name: system:serviceaccounts:kube-system
24 changes: 24 additions & 0 deletions vulns_cn/kubernetes/cve-2017-1002101/init.sh
Original file line number Diff line number Diff line change
@@ -0,0 +1,24 @@
#!/bin/bash
user=`env | grep USER=root`
if [[ $user == "USER=root" ]];then
kubectl apply -f ./config/cve_2017_1002101_policy.yaml
kubectl apply -f ./config/cve_2017_1002101_role_binding.yaml
kubectl apply -f ./config/cve_2017_1002101_role.yaml
if [[ `sudo grep PodSecurityPolicy /etc/kubernetes/manifests/kube-apiserver.yaml` ]];then
echo "The policy has been added."
else
sed -i 's/\-\-admission\-control\=/\-\-admission\-control\=PodSecurityPolicy\,/g' /etc/kubernetes/manifests/kube-apiserver.yaml
echo "Configuration finished."
fi

else
sudo kubectl apply -f ./config/cve_2017_1002101_policy.yaml
sudo kubectl apply -f ./config/cve_2017_1002101_role_binding.yaml
sudo kubectl apply -f ./config/cve_2017_1002101_role.yaml
if [[ `sudo grep PodSecurityPolicy /etc/kubernetes/manifests/kube-apiserver.yaml` ]];then
echo "The policy has been added."
else
sudo sed -i 's/\-\-admission\-control\=/\-\-admission\-control\=PodSecurityPolicy\,/g' /etc/kubernetes/manifests/kube-apiserver.yaml
echo "Configuration finished."
fi
fi
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
# cve_2018_1002105_namespace.yaml
apiVersion: v1
kind: Namespace
metadata:
name: test
Original file line number Diff line number Diff line change
@@ -0,0 +1,16 @@
# cve_2018_1002105_pod.yaml
apiVersion: v1
kind: Pod
metadata:
name: test
namespace: test
spec:
containers:
- name: ubuntu
image: ubuntu:latest
imagePullPolicy: IfNotPresent
# Just spin & wait forever
command: [ "/bin/bash", "-c", "--" ]
args: [ "while true; do sleep 30; done;" ]
serviceAccount: default
serviceAccountName: default
Original file line number Diff line number Diff line change
@@ -0,0 +1,23 @@
# cve_2018_1002105_role.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: test
namespace: test
rules:
- apiGroups:
- ""
resources:
- pods
verbs:
- get
- list
- delete
- watch
- apiGroups:
- ""
resources:
- pods/exec
verbs:
- create
- get
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
# cve_2018_1002105_role_binding.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: test
namespace: test
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
name: test
subjects:
- apiGroup: rbac.authorization.k8s.io
kind: Group
name: test
1 change: 1 addition & 0 deletions vulns_cn/kubernetes/cve-2018-1002105/config/test-token.csv
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
password,test,test,test
Original file line number Diff line number Diff line change
Expand Up @@ -6,6 +6,7 @@ dependencies:
version: 1.11.1
versions: ~
- name: kubelet
- name: test
version: 1.11.1
versions: ~
- name: kubeadm
Expand Down
28 changes: 28 additions & 0 deletions vulns_cn/kubernetes/cve-2018-1002105/init.sh
Original file line number Diff line number Diff line change
@@ -0,0 +1,28 @@
#!/bin/bash
user=`env | grep USER=root`
if [[ $user == "USER=root" ]];then
kubectl apply -f ./config/cve_2018_1002105_namespace.yaml
kubectl apply -f ./config/cve_2018_1002105_role.yaml
kubectl apply -f ./config/cve_2018_1002105_role_binding.yaml
kubectl apply -f ./config/cve_2018_1002105_pod.yaml
cp ./config/test-token.csv /etc/kubernetes/pki/test-token.csv
if [[ `sudo grep test-token.csv /etc/kubernetes/manifests/kube-apiserver.yaml` ]];then
echo "The token file has been added."
else
sed -i '/\/etc\/kubernetes\/pki\/apiserver.key/a\ - --token-auth-file=\/etc\/kubernetes\/pki\/test-token.csv' /etc/kubernetes/manifests/kube-apiserver.yaml
echo "Configuration finished."
fi

else
sudo kubectl apply -f ./config/cve_2018_1002105_namespace.yaml
sudo kubectl apply -f ./config/cve_2018_1002105_role.yaml
sudo kubectl apply -f ./config/cve_2018_1002105_role_binding.yaml
sudo kubectl apply -f ./config/cve_2018_1002105_pod.yaml
sudo cp ./config/test-token.csv /etc/kubernetes/pki/test-token.csv
if [[ `sudo grep test-token.csv /etc/kubernetes/manifests/kube-apiserver.yaml` ]];then
echo "The token file has been added."
else
sudo sed -i '/\/etc\/kubernetes\/pki\/apiserver.key/a\ - --token-auth-file=\/etc\/kubernetes\/pki\/test-token.csv' /etc/kubernetes/manifests/kube-apiserver.yaml
echo "Configuration finished."
fi
fi
Empty file.
Empty file.
Empty file.
Empty file.
Empty file.
Empty file.
Empty file.
Empty file.
Empty file.
Empty file.
Empty file.
Empty file.
Empty file.
Empty file.