Vulnerability identifier: #VU94762
Vulnerability risk: Medium
CVSSv4.0: 7.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:U/U:Green]
CVE-ID:
CWE-ID:
CWE-863
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
moby
Server applications /
Virtualization software
Vendor: Moby project
Description
The vulnerability allows a remote attacker to bypass authorization checks.
The vulnerability exists due to AuthZ zero length regression. A remote user can bypass authentication and gain elevated privileges.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
moby: 19.03.0 - 19.03.15, 20.10.0 - 20.10.27, 23.0.0 - 23.0.14, 24.0.0 - 24.0.9, 25.0.0 - 25.0.5, 26.0.0 rc1 - 26.0.2, 26.1.0 - 26.1.4, 27.0.1 - 27.0.3, 27.1.0
External links
https://github.com/moby/moby/security/advisories/GHSA-v23v-6jw2-98fq
https://github.com/moby/moby/commit/411e817ddf710ff8e08fa193da80cb78af708191
https://github.com/moby/moby/commit/42f40b1d6dd7562342f832b9cd2adf9e668eeb76
https://github.com/moby/moby/commit/65cc597cea28cdc25bea3b8a86384b4251872919
https://github.com/moby/moby/commit/852759a7df454cbf88db4e954c919becd48faa9b
https://github.com/moby/moby/commit/a31260625655cff9ae226b51757915e275e304b0
https://github.com/moby/moby/commit/a79fabbfe84117696a19671f4aa88b82d0f64fc1
https://github.com/moby/moby/commit/ae160b4edddb72ef4bd71f66b975a1a1cc434f00
https://github.com/moby/moby/commit/ae2b3666c517c96cbc2adf1af5591a6b00d4ec0f
https://github.com/moby/moby/commit/cc13f952511154a2866bddbb7dddebfe9e83b801
https://github.com/moby/moby/commit/fc274cd2ff4cf3b48c91697fb327dd1fb95588fb
https://www.docker.com/blog/docker-security-advisory-docker-engine-authz-plugin
https://github.com/moby/moby/releases/tag/v25.0.6
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.