Skip to main content

Snyk Security Labs Research

注目
オープンソースセキュリティ

注意喚起: GitHub Actions における脆弱性を探る

このブログ記事では、GitHub Actions の概要について説明し、実例を用いてさまざまな脆弱性のシナリオについて検討し、問題を起こしやすい機能を安全に使用するためのガイダンスを提供し、構成ファイルをスキャンして潜在的な問題を指摘するように設計されたオープンソースツールを紹介します。

今すぐ読む

編集部のおすすめ

脆弱性インサイト

Leaky Vessels: Docker および runc コンテナブレイクアウトの脆弱性 (2024 年 1 月)

アプリケーションセキュリティ

Gitpod における WebSocket を介したリモートコード実行のゼロデイ脆弱性

表示中 1 - 12 / 20

Package-Lock-Cloud-blog-feature

GitFlops: The dangers of terraform automation platforms

Terraform automation platforms streamline infrastructure management but also introduce security vulnerabilities when speculative plans are executed. Read how attackers can exploit Terraform lifecycle automation to gain unauthorized cloud access, compromising environments far beyond a single team's control. Learn about the attack vectors, including malicious provider plugins and external data sources, and discover essential mitigation strategies to safeguard your infrastructure.

feature-snyk-platform-learn-getting-snyk-setup

Abusing Ubuntu 24.04 features for root privilege escalation

With the recent release of Ubuntu 24.04, we at Snyk Security Labs thought it would be interesting to examine the latest version of this Linux distribution to see if we could find any interesting privilege escalation vulnerabilities.

feature-snyk-platform-learn-getting-snyk-setup

Agent hijacking: The true impact of prompt injection attacks

In this article, after a brief primer on agent architectures, we will review agent systems from two perspectives.

blog-feature-open-source-security

Repo Jacking: The Great Source-code Swindle

In this post, we explore a powerful, yet widely unknown attack vector which has emerged in the last couple of years known as ‘Repo Jacking’. During our research, we discovered the enormous potential to compromise software components with tens of millions of downloads across the Terraform IaC (Infrastructure as Code) and Composer (PHP package registry) ecosystems.

wordpress-sync/blog-feature-toolkit

Breaking caches and bypassing Istio RBAC with HTTP response header injection

This post outlines what we believe to be novel attacks against HTTP application middleware based on the simple foundation of HTTP response header injection.

feature-getting-snyk-setup

注意喚起: GitHub Actions における脆弱性を探る

このブログ記事では、GitHub Actions の概要について説明し、実例を用いてさまざまな脆弱性のシナリオについて検討し、問題を起こしやすい機能を安全に使用するためのガイダンスを提供し、構成ファイルをスキャンして潜在的な問題を指摘するように設計されたオープンソースツールを紹介します。

feature-leaky-vessels-deep-dive

Leaky Vessels deep dive: Escaping from Docker one syscall at a time

Learn how Snyk security researchers uncovered the Leaky Vessels container breakout Docker vulnerabilities assigned CVE-2024-21626, CVE-2024-23652, CVE-2024-23651, and CVE-2024-23653.

feature-leaky-vessels-2024-21626

脆弱性: runc process.cwd と漏洩した fds コンテナブレイクアウト (CVE-2024-21626)

CVE-2024-21626:Snyk は、Docker エンジンや Kubernetes など他のコンテナ化テクノロジで使用されるバージョン 1.1.11 以前のすべての runc に、操作順序コンテナブレイクアウトの脆弱性を発見しました。

feature-leaky-vessels-2024-23651

Buildkit mount cache race: Build-time race condition container breakout (CVE-2024-23651)

Snyk has discovered a build-time race condition container breakout vulnerability in all versions of Buildkit <=v0.12.4, as used by the Docker engine.

feature-leaky-vessels-2024-23652

Buildkit build-time container teardown arbitrary delete (CVE-2024-23652)

CVE-2024-23652: Snyk has discovered a container teardown arbitrary delete vulnerability in all versions of Buildkit <=v0.12.4, as used by the Docker engine.

feature-leaky-vessels-2024-23653

Buildkit GRPC SecurityMode privilege check: Build-time container breakout (CVE-2024-23653)

Snyk has discovered a build-time container breakout vulnerability in all versions of Docker Buildkit <=v0.12.4, as used by the Docker engine (CVE-2024-23653)

feature-insights-context

SocketSleuth: Improving security testing for WebSocket applications

Today, we are proud to announce the beta version of SocketSleuth, our new Burp Suite extension for performing security testing against WebSocket-based applications. SocketSleuth was created out of our security research group to aid in our security research against applications that leverage WebSockets for communication.

12