An improper file permissions vulnerability affects Kata Containers prior to 1.11.5. When using a Kubernetes hostPath volume and mounting either a file or directory into a container as readonly, the file/directory is mounted as readOnly inside the container, but is still writable inside the guest. For a container breakout situation, a malicious guest can potentially modify or delete files/directories expected to be read-only.
Related Articles
Ideal Tasks and Use-Cases · rez0
Table of Contents The Ideal Tasks for ChatGPT Active Input Processing ChatGPT Engineering Use-Cases Now do it! I’ve been using ChatGPT for lots of hacking…
Cybernoz
4 min read
Guest blog: streaak – my recon techniques from 2019
Table of Contents What is recon? Subdomain recon Gathering endpoints passively JavaScript recon Subdomain takeovers Sensitive data exposure meg+gf Directory and endpoint brute-forcing Visual recon…
Cybernoz
10 min read
AI-Powered Hacking · Joseph Thacker
In most domains, the best AI tools of our day reduce friction and speed up top-tier humans. Agents might take over later, but for now,…
Cybernoz
2 min read

