Daily Shaarli
May 2, 2024
當代英文語料庫

How we cut build times by 50% and shipped a solution for scale.

A quick way to prepare for your next interview. Practice key questions, get insights about your answers, and get more comfortable interviewing.

An abuse of functionality in the OpenSSL binary, installed in the official Google Container Tools Distroless Base container image, allows for command execution and arbitrary file read and write on distroless containers. By abusing the enc functionality in the OpenSSL binary it is possible to read and write to the filesystem using the -in and -out options and combining the write to the filesystem capability with the engine functionality that allows us to load shared libraries, it is possible to obtain command execution by uploading and loading malicious library.