• mmddmm@lemm.ee
    link
    fedilink
    arrow-up
    21
    arrow-down
    3
    ·
    10 天前

    It’s the settiings file… It’s probably supposed to only be written by the system admin.

    • raldone01@lemmy.world
      link
      fedilink
      arrow-up
      10
      arrow-down
      1
      ·
      edit-2
      10 天前

      A good place to put persistent malware. That’s why when using docker images always mount as ro if at all possible.

      • Ashley@lemmy.ca
        link
        fedilink
        arrow-up
        10
        arrow-down
        1
        ·
        10 天前

        It’s you can modify the settings file you sure as hell can put the malware anywhere you want

        • MajorHavoc@programming.dev
          link
          fedilink
          arrow-up
          2
          arrow-down
          1
          ·
          edit-2
          7 天前

          It’s you can modify the settings file you sure as hell can put the malware anywhere you want

          True. (But in case it amuses you or others reading along:) But a code settings file still carries it’s own special risk, as an executable file, in a predictable place, that gets run regularly.

          An executable settings file is particularly nice for the attacker, as it’s a great place to ensure that any injected code gets executed without much effort.

          In particular, if an attacker can force a reboot, they know the settings file will get read reasonably early during the start-up process.

          So a settings file that’s written in code can be useful for an attacker who can write to the disk (like through a poorly secured upload prompt), but doesn’t have full shell access yet.

          They will typically upload a reverse shell, and use a line added to settings to ensure the reverse shell gets executed and starts listening for connections.

          Edit (because it may also amuse anyone reading along): The same attack can be accomplished with a JSON or YAML settings file, but it relies on the JSON or YAML interpreter having a known critical security flaw. Thankfully most of them don’t usually have one, most of the time, if they’re kept up to date.

      • mmddmm@lemm.ee
        link
        fedilink
        arrow-up
        4
        ·
        10 天前

        Every environment has plenty of good places to put persistent malware. Even if you run your docker images as ro.