Are you relying on your container scanning to secure your applications? You might be exposed!
Containers have taken IT by storm. They increase delivery speed and stability. To secure them, you just run a scanner, right? Perhaps…
Metal detectors cannot detect plastic explosives. Similarly, many container scanners (e.g., Quay, Docker Hub, and even Snyk) are unable to detect the most vulnerable libraries inside Docker containers or Kubernetes clusters.
Do you want to know what your container scanner might be missing?
Watch this live streaming event with the heavyweight security expert Julius Musseau, where he highlights the issues and presents solutions. Learn about the typical container scanning short falls.
What you learn (takeaways)
- Where most container scanners fall short (and can seriously hurt you).
- A methodology to evaluate container scanners
- How to simplify application security AND improve container scanning (too good to be true?)
Webinar Highlights
Container Scanning – The Actual Results
Container Scanning | Mergebase
This could be a problem because:
1. Some libraries don’t include metadata files – either on purpose, or by accident, or by historical happenstance (e.g., the metadata format had not been standardized back in 2005 when the Jar was created).
2. Open source logic can be mixed and imported in different ways (open source licenses usually don’t forbid this), and metadata might get altered or omitted during such transformations. Copy/paste, anyone?
3. Finally, what if someone maliciously removes or alters the metadata?
Conclusion
When evaluating scanners, it’s very important to examine them with a pre-seeded known-vulnerable sample (preferably one you create yourself) during your tool selection process (and perhaps during an annual check-up/review).
And one final caveat: I suspect the scanners were all carefully tuned to detect log4j (e.g., special one-off logic). I would be pleasantly surprised if they did as well against less infamous (but similarly vulnerable) samples.
MergeBase actually looks at the class files. And so MergeBase detects the vulnerable version in “Hard Mode” regardless of the metadata present or not present.