Article Details
Scrape Timestamp (UTC): 2025-10-30 16:32:56.608
Source: https://www.theregister.com/2025/10/30/docker_compose_desktop_flaws/
Original Article Text
Click to Toggle View
Docker Compose vulnerability opens door to host-level writes – patch pronto. Windows Desktop installer also fixed after DLL hijack flaw rated 8.8 severity. Docker Compose users are being strongly urged to upgrade their versions of the orchestration tool after a researcher uncovered a flaw that could allow attackers to stage path traversal attacks. NIST has dubbed the Compose vulnerability CVE-2025-62725 and given it a 8.9 severity rating. The bug was uncovered by Imperva's Ron Masas in early October. As Masas writes, Compose is a "friendly layer above Docker Engine that turns a few YAML lines into a running application." Unsurprisingly then, it powers millions of workflows, "from CI/CD runners and local development stacks to cloud workspaces and enterprise build pipelines." He uncovered the high-severity path traversal vulnerability while exploring the tool's recently added support for OCI-based Compose artifacts. "The flaw allowed attackers to escape Compose's cache directory and write arbitrary files on the host system, simply by tricking a user into referencing a malicious remote artifact." "When Compose processed OCI layers it trusted the layer annotations that tell it where to write files," he said. So an attacker could craft an annotation, and Compose "performed a literal join between its local cache directory and that annotation… No normalization, no canonicalization, no checks that the resulting path stayed inside the cache." That in turn would allow the crafted annotation to traverse out of the cache directory, "and cause Compose to write files anywhere the Compose process had permission to write." While Docker Compose's OCI artifact feature aims to streamline configuration sharing, this incident illustrates how automatic file reconstruction from unverified sources can obscure important security boundaries. Masas said the Docker team's quick response and fix ensured users remain protected, but the incident drove home the point to "sanitize every path, even when 'it's just YAML.'" In the meantime, Imperva recommended users upgrade to v2.40.2. In other news, Docker has fixed a flaw in its Windows Installer that left it vulnerable to DLL injection. The Desktop Installer.exe flaw was dubbed EUVD-2025-36191 by ENISA earlier this week, with a 8.8 rating. ENISA said the flaw means Desktop Installer.exe "is vulnerable to DLL hijacking due to insecure DLL search order. The installer searches for required DLLs in the user's Downloads folder before checking system directories." This weakness allowed attackers to gain higher-level access to the system by placing malicious DLL files in specific locations. Docker plugged the gap in Desktop 4.49.0, released last week, meaning users should upgrade if they haven't already. Release notes for the latest version also warned that the next release onward will require at least Windows 10 22H2 or Windows 11 23H2. This is the second month on the trot Docker has had to plug a high-severity flaw in Desktop, while in August, it had to plug a critical flaw. However, many vendors or projects happily clock up tens, hundreds, or even thousands of flaws a year. OWASP's first rule for Docker security is "Keep Host and Docker up to date."
Daily Brief Summary
A path traversal vulnerability in Docker Compose, identified as CVE-2025-62725, was discovered by Imperva's Ron Masas, receiving a severity rating of 8.9 from NIST.
The flaw allowed attackers to write arbitrary files on the host system by exploiting OCI-based Compose artifacts, posing a significant risk to millions of workflows.
Docker's quick response included a patch in version v2.40.2, emphasizing the importance of sanitizing paths even in seemingly simple configurations like YAML.
A separate DLL hijack vulnerability in Docker's Windows Installer, rated 8.8 by ENISA, was also patched, preventing unauthorized system access via malicious DLL files.
Users are advised to upgrade to Docker Desktop 4.49.0 to mitigate the DLL hijacking risk, with future releases requiring updated Windows versions.
These incidents highlight the critical need for continuous updates and vigilance in maintaining secure software environments, as Docker addresses multiple high-severity flaws.
The situation serves as a reminder of OWASP's guidance to keep both host systems and Docker installations current to minimize security risks.