-
Notifications
You must be signed in to change notification settings - Fork 42
Open
Description
Summary
This issue was identified by an automated security audit run by Claude.
Severity: CRITICAL (P0)
Description
The sandbox containers are configured with no-new-privileges=false, which allows processes to gain additional privileges via setuid binaries and other mechanisms. This setting should be true to prevent privilege escalation.
Location: backend/app/services/sandbox_providers/docker_provider.py (lines 119-120)
privileged=True,
security_opt=["no-new-privileges=false"],Attack Scenario
With no-new-privileges=false:
# Setuid binaries can escalate privileges
# If there's a vulnerable setuid binary:
./vulnerable_setuid_binary # Can now get rootRemediation
Change no-new-privileges=false to no-new-privileges=true:
security_opt=["no-new-privileges=true"], # Changed from false to trueRisk if Unfixed
Privilege escalation within the container, potentially leading to container escape when combined with other vulnerabilities.
🤖 This issue was identified by an automated security audit run by Claude.
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels