Skip to content

Commit

Permalink
Add detection for attempt to use CVE-2023-4911
Browse files Browse the repository at this point in the history
Signed-off-by: Richard Tweed <RichardoC@users.noreply.github.com>
  • Loading branch information
RichardoC authored and poiana committed Oct 11, 2023
1 parent 5f42a38 commit af9f206
Showing 1 changed file with 12 additions and 0 deletions.
12 changes: 12 additions & 0 deletions rules/falco-incubating_rules.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -1253,3 +1253,15 @@
output: Adding ssh keys to authorized_keys (file=%fd.name evt_type=%evt.type user=%user.name user_uid=%user.uid user_loginuid=%user.loginuid process=%proc.name proc_exepath=%proc.exepath parent=%proc.pname command=%proc.cmdline terminal=%proc.tty exe_flags=%evt.arg.flags)
priority: WARNING
tags: [maturity_incubating, host, filesystem, mitre_persistence, T1098.004]

# Detection for possible use of CVE-2023-4911
# Based on https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt
- rule: Program possibly trying to use CVE-2023-4911
desc: >
Detect use of GLIBC_TUNABLES environment variable, which could be used for priviledge escalation to root on hosts running vulnerable glibc versions.
condition: >
spawned_process
and proc.env icontains GLIBC_TUNABLES
output: Process run with GLIBC_TUNABLES environment variable which could be attempting priviledge escalation (env=%proc.env evt_type=%evt.type user=%user.name user_uid=%user.uid user_loginuid=%user.loginuid process=%proc.name proc_exepath=%proc.exepath parent=%proc.pname command=%proc.cmdline terminal=%proc.tty exe_flags=%evt.arg.flags %container.info)
priority: NOTICE
tags: [maturity_incubating, host, users, mitre_privilege_escalation, CVE-2023-4911]

0 comments on commit af9f206

Please sign in to comment.