<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Boxlite — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/boxlite/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 21 May 2026 21:54:26 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/boxlite/feed.xml" rel="self" type="application/rss+xml"/><item><title>Boxlite: Permission Bypass Allows Modification of Read-Only Files via virtiofs</title><link>https://feed.craftedsignal.io/briefs/2026-05-boxlite-ro-bypass/</link><pubDate>Thu, 21 May 2026 21:54:26 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-boxlite-ro-bypass/</guid><description>Boxlite, a sandbox service, allows malicious code within a container to bypass read-only restrictions on mounted host directories using virtiofs, due to missing hypervisor-level enforcement and unrestricted kernel capabilities, leading to potential code execution on the host and supply chain risks.</description><content:encoded><![CDATA[<p>Boxlite is a sandbox service designed to allow users to execute untrusted code in lightweight virtual machines (Boxes). A key security feature is the ability to mount host directories in read-only mode into the VM using the virtiofs protocol, preventing modifications to host data. However, a vulnerability exists that allows malicious code within the container to bypass these read-only restrictions. This is because Boxlite&rsquo;s implementation relies on adding the MS_RDONLY flag <em>after</em> mounting, and does not restrict kernel capabilities.  Malicious code can remount the directory in read-write mode. In typical usage scenarios, such as AI Agent sandboxes where user code, virtual environments, and configuration files are mounted read-only, this vulnerability allows attackers to plant malicious code and gain code execution on the host, leading to supply chain risks. The vulnerability exists because the underlying libkrun library does not support read-only mounts, and Boxlite&rsquo;s guest agent (Zone 0) is not trusted to enforce the restriction.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user mounts a host directory into a Boxlite VM with the <code>read_only</code> flag set to <code>true</code> in the <code>VolumeSpec</code>.</li>
<li>The Boxlite runtime logs the <code>read_only</code> setting but does not pass it to the <code>krun_add_virtiofs</code> function, which lacks a read-only parameter.</li>
<li>The hypervisor exposes the virtiofs share to the guest with full read-write access at the device level via <code>libkrun</code>.</li>
<li>The <code>read_only</code> flag is sent to the guest agent as a mount instruction via gRPC.</li>
<li>The guest agent, running untrusted code, receives the mount instruction with the <code>read_only</code> flag.</li>
<li>The malicious code uses the <code>mount</code> command with the <code>remount,rw</code> options to change the mount flags of the virtiofs share from read-only to read-write.</li>
<li>The attacker writes to the now writable directory, modifying or creating files on the host system.</li>
<li>The attacker gains code execution capability on the host.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows malicious code running inside a Boxlite sandbox to bypass intended security restrictions and perform arbitrary write operations on directories that were supposed to be read-only.  This can lead to code execution on the host, potentially compromising user data, virtual environments, and configuration files. This is especially dangerous in AI Agent scenarios, potentially leading to supply chain risks by planting malicious code in trusted environments. While the exact number of victims is unknown, the impact on affected Boxlite deployments could be significant, especially those relying on the read-only mount feature for security.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to a patched version of Boxlite that addresses the read-only bypass vulnerability (reference: GHSA-g6ww-w5j2-r7x3).</li>
<li>Implement a capability drop profile to remove the <code>CAP_SYS_ADMIN</code> capability from the container, preventing the remount attack (reference: Attack Chain step 6).</li>
<li>Deploy the Sigma rule &ldquo;Detect Boxlite Read-Only Bypass via Mount Remount&rdquo; to detect attempts to remount file systems within Boxlite containers (reference: rules).</li>
<li>Review all volume specifications to ensure that sensitive host directories are not being mounted into Boxlite VMs without adequate write protection (reference: Attack Chain step 1).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>persistence</category><category>sandbox-escape</category></item></channel></rss>