Article Details

Scrape Timestamp (UTC): 2024-07-25 13:51:09.415

Source: https://www.theregister.com/2024/07/25/5yo_docker_vulnerability/

Original Article Text

Click to Toggle View

You should probably fix this 5-year-old critical Docker vuln fairly sharpish. For some unknown reason, initial patch was omitted from later versions. Docker is warning users to rev their Docker Engine into patch mode after it realized a near-maximum severity vulnerability had been sticking around for five years. Now tracked as CVE-2024-41110, the privilege escalation bug was originally discovered in 2018 and patched in January 2019's version 18.09.1. However, the fix wasn't carried over in the following updates, meaning versions from 19.03 and newer remained vulnerable. The vulnerability lies in Docker's use of authorization plugins (AuthZ) for greater access control. They're used to approve and deny requests, and do so through information provided to them in the body, which is assessed to make validation decisions. Attackers could exploit the vulnerability by sending a specially crafted API request with the body's Content-Length set to 0. Without a body, the AuthZ plugin is fed no information that can be used to inform an authorization request. By sending a body-less request, an attacker can force the Docker Engine API client to forward that request to an authorization plugin, which may, in error, approve a request that would have been denied if the body content was forwarded to it. This can lead to unintended commands being executed that can lead to consequences like attackers escalating their privileges. Docker says the likelihood of this attack being exploited is low, but the vulnerability's CVSS assessment indicates it's a low-complexity attack that requires low-level privileges and no user interaction. The potential impact on confidentiality, integrity, and availability is all "high," and together this has contributed to an overall severity score of 9.9, according to the National Vulnerability Database. A separate advisory from the open source Moby project assessed this to be a perfect 10 score, however. Docker recommends that users upgrade to the safe versions: > v23.0.14 and > v27.1.0.  If you're running a version that's affected but do not rely on authorization plugins, you're not vulnerable to CVE-2024-41110, and neither are Mirantis Container Runtime users. For those running Docker Desktop, a fix is coming in v4.33, but the impact is thought to be less severe than in production environments, Docker said. To access the Docker API, which is crucial for an exploit, the attacker would already need to have local access to the machine, or have the Docker daemon exposed over TCP. Although vulnerable versions of Docker Engine are in the latest Docker Desktop release, the default Desktop configuration doesn't rely on AuthZ plugins. Even if the above conditions were working in an attacker's favor, privilege escalation would also only be limited to the Docker Desktop VM and not the host.

Daily Brief Summary

MALWARE // Critical Docker Vulnerability Unpatched for Five Years

Docker has discovered a critical vulnerability, CVE-2024-41110, impacting Docker Engine versions since 2019, which had been originally patched in early 2019 but was mistakenly not carried over to later updates.

The vulnerability arises from the mishandling of authorization plugins (AuthZ) in Docker, where a specially crafted API request with a body content length of zero bypasses normal security checks, potentially allowing unauthorized command execution.

The exploit requires low-level access and no user interaction, with Docker assessing the overall attack complexity as low but the potential impact on system confidentiality, integrity, and availability as high.

National Vulnerability Database rates the severity of this vulnerability at 9.9 out of 10, indicating a near-maximum threat, while a separate assessment by the Moby project gives it a perfect score of 10.

Affected Docker Engine versions include all releases from 19.03 onward; users are advised to upgrade to the versions above v23.0.14 and v27.1.0 to mitigate the risk.

Docker Desktop is also affected, although a fix (v4.33) is pending, and the impact is deemed less severe due to the default configuration and the limited scope of potential privilege escalation within the Docker Desktop VM.

Docker emphasizes that the vulnerability affects only setups using AuthZ plugins, and systems not using these plugins or running Mirantis Container Runtime are not vulnerable.