misconfigured-docker: Docker Container - Misconfiguration Exposure

日期: 2025-08-01 | 影响软件: Docker | POC: 已公开

漏洞描述

A Docker container misconfiguration was discovered. The Docker daemon can listen for Docker Engine API requests via three different types of Socket - unix, tcp, and fd. With tcp enabled, the default setup provides un-encrypted and un-authenticated direct access to the Docker daemon. It is conventional to use port 2375 for un-encrypted, and port 2376 for encrypted communication with the daemon.

PoC代码[已公开]

id: misconfigured-docker

info:
  name: Docker Container - Misconfiguration Exposure
  author: dhiyaneshDK
  severity: critical
  description: A Docker container misconfiguration was discovered. The Docker daemon can listen for Docker Engine API requests via three different types of Socket - unix, tcp, and fd. With tcp enabled, the default setup provides un-encrypted and un-authenticated direct access to the Docker daemon. It is conventional to use port 2375 for un-encrypted, and port 2376 for encrypted communication with the daemon.
  reference:
    - https://madhuakula.com/content/attacking-and-auditing-docker-containers-using-opensource/attacking-docker-containers/misconfiguration.html
  metadata:
    max-request: 1
  tags: misconfig,docker,unauth,devops,vuln

http:
  - method: GET
    path:
      - "{{BaseURL}}/images/json"

    matchers-condition: and
    matchers:
      - type: word
        words:
          - '"ParentId":'
          - '"Containers":'
          - '"Labels":'
        condition: and

      - type: status
        status:
          - 200
# digest: 490a0046304402207ac26b4454ceed7bca3a78039b93d1788a3c00b6a81133872aeca1b863587a0a0220408d75907d2d7aae3a8dc3767a911adabad1e78258bf750e6def8e3e4a10b36d:922c64590222798bb761d5b6d8e72950

相关漏洞推荐