Skip to content

[🐛 Bug]: Potential Malware (perfctl) Injected via Selenium Chrome in Docker Container #2702

@ILYAGVC

Description

@ILYAGVC

What happened?

Description

I've noticed a persistent security issue where a malware named perfctl infiltrates my Docker container when using Selenium Chrome. Despite multiple attempts to remove the malware and rebuild the container, it keeps reappearing.

Steps to Reproduce

  1. Use Selenium Chrome in a Docker container.
  2. Run the container and monitor processes.
  3. Notice the perfctl malware appearing and executing suspicious activities.

Expected Behavior

No unauthorized processes or malware should be present in the container.

Actual Behavior

The perfctl malware keeps reappearing, potentially compromising security.

Potential Impact

This issue poses a security risk as it allows unauthorized access and execution of malicious activities within the container.

Request for Investigation

Please investigate whether the base image, dependencies, or any other component in Selenium Chrome is compromised. Any guidance on mitigation or security best practices would also be appreciated.

Command used to start Selenium Grid with Docker (or Kubernetes)

docker run -d -p 4444:4444 -p 7900:7900 --shm-size="2g" selenium/standalone-chrome:latest

Relevant log output

Operating System

Ubuntu 22

Docker Selenium version (image tag)

4.28.1-20250202

Selenium Grid chart version (chart version)

No response

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions