Skip to main content

SQ40107

Detected container images that might expose the Remote Shell (rsh) port.

priorityCI/CD statusseverityeffortSAFE levelSAFE assessment
passhighmediumNonehardening: warning
Reason: exposed container ports

About the issueโ€‹

Containers are a simple, yet powerful approach to process and filesystem isolation. When configured correctly, a container runs a set of processes isolated from their host system. Containers typically run as executables or as services, but regardless of their use, they must be properly secured. Although rsh might seem practical for administration, it is an insecure protocol that transmits unencrypted credentials, and can additionally increase the attack surface by providing an obvious entry point in an environment.

How to resolve the issueโ€‹

  • Avoid running remote access services such as rsh.
  • Check if there's a running rsh daemon or service in the container's process list bound to port 514, or if one is executed on startup, and remove it.

Incidence statisticsโ€‹

ReversingLabs periodically collects and analyzes the contents of popular software package repositories for threat research purposes. Analysis results are used to calculate incidence statistics for issues (policy violations) that Spectra Assure can detect in software packages.

This section is updated when new data becomes available.

Total amount of packages analyzed

  • RubyGems: 183K
  • Nuget: 644K
  • PyPi: 628K
  • NPM: 3.72M
Statistics are not collected for the SQ40107 policy at this time, or not applicable to this type of issue.