[ 
https://issues.apache.org/jira/browse/MESOS-5388?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15402727#comment-15402727
 ] 

Jie Yu commented on MESOS-5388:
-------------------------------

commit ca5eaad82f69309de427aab3ec2ed7976c9cc850
Author: Gilbert Song <[email protected]>
Date:   Mon Aug 1 13:05:53 2016 -0700

    Updated docker volume isolator to return non-shell 'pre_exec_commands'.
    
    Review: https://reviews.apache.org/r/50535/

commit 202e1933c592f456420ec1c85fd9a212222d0df9
Author: Gilbert Song <[email protected]>
Date:   Mon Aug 1 13:03:16 2016 -0700

    Updated mesos containerizer launch execute() to return 'EXIT_FAILURE'.
    
    Review: https://reviews.apache.org/r/50534/

> MesosContainerizerLaunch flags execute arbitrary commands via shell
> -------------------------------------------------------------------
>
>                 Key: MESOS-5388
>                 URL: https://issues.apache.org/jira/browse/MESOS-5388
>             Project: Mesos
>          Issue Type: Bug
>          Components: containerization
>            Reporter: James DeFelice
>            Assignee: Gilbert Song
>              Labels: mesosphere, security
>
> For example, the docker volume isolator's containerPath is appended (without 
> sanitation) to a command that's executed in this manner. As such, it's 
> possible to inject arbitrary shell commands to be executed by mesos.
> https://github.com/apache/mesos/blob/17260204c833c643adf3d8f36ad8a1a606ece809/src/slave/containerizer/mesos/launch.cpp#L206
> Perhaps instead of strings these commands could/should be sent as string 
> arrays that could be passed as argv arguments w/o shell interpretation?



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to