Unexpected Privileged Containers
osquery
Detect the execution of privileged Docker containers which can be used to escape to the host.
Description
ODK (osquery-defense-kit) is unique in that the queries are designed to be used as part of a production detection & response pipeline. The detection queries are formulated to return zero rows during normal expected behavior, so that they may be configured to generate alerts when rows are returned.
Query
-- Detect the execution of privileged Docker containers which can be used to escape to the host.
--
-- references:
-- * https://attack.mitre.org/techniques/T1611/
--
-- false-positives:
-- * Nested Kubernetes Environments
-- * Containerized builds
--
-- This query works on macOS as well, but is only an in-the-wild security problem on Linux,
-- where the kernel namespaces can be shared. These kind of attacks tend to be
--
-- platform: linux
-- tags: transient state container escalation extra
SELECT
command,
image_id,
path,
security_options,
started_at,
image,COALESCE(REGEX_MATCH (image, '(.*?):', 1), image) AS image_name
FROM
docker_containersWHERE
= 1
privileged AND image_name NOT IN (
'distroless.dev/melange',
'docker.io/library/registry',
'docker.io/rancher/k3s',
'gcr.io/k8s-minikube/kicbase',
'jdk-crac',
'kindest/node',
'ligfx/k3d-registry-dockerd',
'moby/buildkit',
'wolfi'
)AND image NOT LIKE 'cgr.dev/chainguard%'
AND image NOT LIKE 'ghcr.io/k3d-io/k3d-%'
AND image NOT LIKE 'ghcr.io/wolfi-dev/%'
AND image NOT LIKE 'k3d-k3d.localhost:%'
AND image NOT LIKE 'melange-%'
AND command NOT LIKE '/usr/bin/melange build %'
tags: SStagSS