An improper file permissions vulnerability affects Kata Containers prior to 1.11.5. When using a Kubernetes hostPath volume and mounting either a file or directory into a container as readonly, the file/directory is mounted as readOnly inside the container, but is still writable inside the guest. For a container breakout situation, a malicious guest can potentially modify or delete files/directories expected to be read-only.
Related Articles
All Mix →How EASM and Penetration Testing compare
Table of Contents Understanding External Attack Surface Management (EASM) EASM use cases: The role of Penetration Testing (Pen Testing) Pen Testing use case: How EASM…
Caffeinate Your Mac
Did you know your MacBook has a built-in barista? Well, sort of. It’s called ‘caffeinate’, and it’s a nifty little command that keeps your Mac…
How They Got Hacked Episode Forty Six 46
How They Got Hacked Episode Forty Six 46 Source link
Using Reflections to Compress LLM Context Data
Table of Contents Reflections Applying Reflections to real-word applications Examples How do you know what to keep and what to discard? Summary As I’ve discussed…
Who’s Not Getting Laid Off?
Who’s not being laid off? That’s my question. I’m thinking about all these layoffs and trying to figure out if there’s anything we can learn…
High Risk Vulnerabilities within the DoD – Exploiting Coldfusion, Dotnet Nuke, Oracle, and more | by Alyssa Herrera
The Department of Defense Launched a bug bounty program on November 21st, 2016 on Hackerone. This allowed researchers to report vulnerabilities on any military domain,…

