#VU50273 Permissions, Privileges, and Access Controls in Docker


Published: 2021-02-02 | Updated: 2021-02-03

Vulnerability identifier: #VU50273

Vulnerability risk: Medium

CVSSv3.1: 7 [CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-21284

CWE-ID: CWE-264

Exploitation vector: Local network

Exploit availability: No

Vulnerable software:
Docker
Server applications / Virtualization software

Vendor:

Description

The vulnerability allows a remote attacker to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions when using the --userns-remap option. A remote authenticated attacker on the local network can send a specially crafted request and gain elevated privileges as root on the system.

Mitigation
Install updates from vendor's website.

Vulnerable software versions


External links
http://docs.docker.com/engine/release-notes/#20103
http://github.com/moby/moby/commit/64bd4485b3a66a597c02c95f5776395e540b2c7c
http://github.com/moby/moby/releases/tag/v19.03.15
http://github.com/moby/moby/releases/tag/v20.10.3
http://github.com/moby/moby/security/advisories/GHSA-7452-xqpj-6rpc


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability