Snort mailing list archives

Re: Kubernetes kubelet API


From: Phillip Lee <phillile () sourcefire com>
Date: Mon, 7 May 2018 13:31:54 -0400

Yaser,

Thanks for your submission. We will review the rules and get back to you when they're finished. 

Regards,
Phil Lee
Cisco Talos

On May 7, 2018, at 1:03 PM, Y M via Snort-sigs <snort-sigs () lists snort org> wrote:

Hi,

The first rule addresses the unauthenticated read-only HTTP access potentially disclosing sensitive information about 
pods. The second rule address the remote execution attempts over the HTTPS read/write port. No pcaps available.

# --------------------
# Date: 2018-05-06
# Title: Analysis of a Kubernetes hack — Backdooring through kubelet
# Reference: https://medium.com/handy-tech/analysis-of-a-kubernetes-hack-backdooring-through-kubelet-823be5c3d67c 
<https://medium.com/handy-tech/analysis-of-a-kubernetes-hack-backdooring-through-kubelet-823be5c3d67c>
# Tests: syntax only

alert tcp $EXTERNAL_NET any -> $HOME_NET [10250,10255] (msg:"SERVER-OTHER Kubernetes kubelet API read-only pods 
information access attempt"; flow:to_server,established; content:"GET"; http_method; content:"/pods"; 
fast_pattern:only; http_uri; 
reference:url,medium.com/handy-tech/analysis-of-a-kubernetes-hack-backdooring-through-kubelet-823be5c3d67c 
<http://medium.com/handy-tech/analysis-of-a-kubernetes-hack-backdooring-through-kubelet-823be5c3d67c>; 
classtype:attempted-admin; sid:8000039; rev:1;)

alert tcp $EXTERNAL_NET any -> $HOME_NET [10250,10255] (msg:"SERVER-OTHER Kubernetes kubelet API pod remote execution 
attempt"; flow:to_server,established; content:"POST"; http_method; content:"/exec/"; fast_pattern:only; http_uri; 
content:"?command="; http_uri; 
reference:url,medium.com/handy-tech/analysis-of-a-kubernetes-hack-backdooring-through-kubelet-823be5c3d67c 
<http://medium.com/handy-tech/analysis-of-a-kubernetes-hack-backdooring-through-kubelet-823be5c3d67c>; 
classtype:attempted-admin; sid:8000040; rev:1;)

Thanks.
YM
_______________________________________________
Snort-sigs mailing list
Snort-sigs () lists snort org <mailto:Snort-sigs () lists snort org>
https://lists.snort.org/mailman/listinfo/snort-sigs <https://lists.snort.org/mailman/listinfo/snort-sigs>

Please visit http://blog.snort.org <http://blog.snort.org/> for the latest news about Snort!

Please follow these rules: https://snort.org/faq/what-is-the-mailing-list-etiquette 
<https://snort.org/faq/what-is-the-mailing-list-etiquette>

Visit the Snort.org <http://snort.org/> to subscribe to the official Snort ruleset, make sure to stay up to date to 
catch the most <a href=" https://snort.org/downloads/#rule-downloads 
<https://snort.org/downloads/#rule-downloads>">emerging threats</a>!

_______________________________________________
Snort-sigs mailing list
Snort-sigs () lists snort org
https://lists.snort.org/mailman/listinfo/snort-sigs

Please visit http://blog.snort.org for the latest news about Snort!

Please follow these rules: https://snort.org/faq/what-is-the-mailing-list-etiquette

Visit the Snort.org to subscribe to the official Snort ruleset, make sure to stay up to date to catch the most <a 
href=" https://snort.org/downloads/#rule-downloads";>emerging threats</a>!

Current thread: