Common Container Manager Is Vulnerable to Dangerous Exploit
Container manager vulnerability is one of several weaknesses and vulnerabilities recently disclosed for Docker.
A vulnerability in the way a common container management component spawns a service called a "shim" could allow unauthorized third parties to initiate containers with arbitrary contents and arbitrary permission levels.
The vulnerability, discovered by researchers at NCC Group, lies in the way containerd -- a core container runtime -- and specifically containerd-shim listen to Unix domain sockets for messages relating to the container it is managing. This container manager vulnerability is one of several weaknesses and vulnerabilities recently disclosed for Docker and other container management systems.
Typically, containerd-shim would listen and create the container using an abstract Unix domain socket. These abstract Unix domain sockets are tied to the Unix namespace rather than a particular file path. And that broader binding is the source of the trouble.
Because of the namespace tie, containerd-shim will expose APIs that can escape from the container and execute privileged commands on the host server. This is why the vulnerability has been given a CVCC of 8.8.
NCC Group provides a number of recommendations for making containerd safer, and notes that the newest versions of containerd have patched for this vulnerability. CVE-2020-15257.
For more, read here.
About the Author(s)
You May Also Like
Beyond Spam Filters and Firewalls: Preventing Business Email Compromises in the Modern Enterprise
April 30, 2024Key Findings from the State of AppSec Report 2024
May 7, 2024Is AI Identifying Threats to Your Network?
May 14, 2024Where and Why Threat Intelligence Makes Sense for Your Enterprise Security Strategy
May 15, 2024Safeguarding Political Campaigns: Defending Against Mass Phishing Attacks
May 16, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024