CVE-2024-41110

Moby is an open-source project created by Docker for software containerization. A security vulnerability has been detected in certain versions of Docker Engine, which could allow an attacker to bypass authorization plugins (AuthZ) under specific circumstances. The base likelihood of this being exploited is low. Using a specially-crafted API request, an Engine API client could make the daemon forward the request or response to an authorization plugin without the body. In certain circumstances, the authorization plugin may allow a request which it would have otherwise denied if the body had been forwarded to it. A security issue was discovered In 2018, where an attacker could bypass AuthZ plugins using a specially crafted API request. This could lead to unauthorized actions, including privilege escalation. Although this issue was fixed in Docker Engine v18.09.1 in January 2019, the fix was not carried forward to later major versions, resulting in a regression. Anyone who depends on authorization plugins that introspect the request and/or response body to make access control decisions is potentially impacted. Docker EE v19.03.x and all versions of Mirantis Container Runtime are not vulnerable. docker-ce v27.1.1 containes patches to fix the vulnerability. Patches have also been merged into the master, 19.03, 20.0, 23.0, 24.0, 25.0, 26.0, and 26.1 release branches. If one is unable to upgrade immediately, avoid using AuthZ plugins and/or restrict access to the Docker API to trusted parties, following the principle of least privilege.
References
Link Resource
https://github.com/moby/moby/commit/411e817ddf710ff8e08fa193da80cb78af708191
https://github.com/moby/moby/commit/42f40b1d6dd7562342f832b9cd2adf9e668eeb76
https://github.com/moby/moby/commit/65cc597cea28cdc25bea3b8a86384b4251872919
https://github.com/moby/moby/commit/852759a7df454cbf88db4e954c919becd48faa9b
https://github.com/moby/moby/commit/a31260625655cff9ae226b51757915e275e304b0
https://github.com/moby/moby/commit/a79fabbfe84117696a19671f4aa88b82d0f64fc1
https://github.com/moby/moby/commit/ae160b4edddb72ef4bd71f66b975a1a1cc434f00
https://github.com/moby/moby/commit/ae2b3666c517c96cbc2adf1af5591a6b00d4ec0f
https://github.com/moby/moby/commit/cc13f952511154a2866bddbb7dddebfe9e83b801
https://github.com/moby/moby/commit/fc274cd2ff4cf3b48c91697fb327dd1fb95588fb
https://github.com/moby/moby/security/advisories/GHSA-v23v-6jw2-98fq
https://www.docker.com/blog/docker-security-advisory-docker-engine-authz-plugin
https://github.com/moby/moby/commit/411e817ddf710ff8e08fa193da80cb78af708191
https://github.com/moby/moby/commit/42f40b1d6dd7562342f832b9cd2adf9e668eeb76
https://github.com/moby/moby/commit/65cc597cea28cdc25bea3b8a86384b4251872919
https://github.com/moby/moby/commit/852759a7df454cbf88db4e954c919becd48faa9b
https://github.com/moby/moby/commit/a31260625655cff9ae226b51757915e275e304b0
https://github.com/moby/moby/commit/a79fabbfe84117696a19671f4aa88b82d0f64fc1
https://github.com/moby/moby/commit/ae160b4edddb72ef4bd71f66b975a1a1cc434f00
https://github.com/moby/moby/commit/ae2b3666c517c96cbc2adf1af5591a6b00d4ec0f
https://github.com/moby/moby/commit/cc13f952511154a2866bddbb7dddebfe9e83b801
https://github.com/moby/moby/commit/fc274cd2ff4cf3b48c91697fb327dd1fb95588fb
https://github.com/moby/moby/security/advisories/GHSA-v23v-6jw2-98fq
https://lists.debian.org/debian-lts-announce/2024/10/msg00009.html
https://security.netapp.com/advisory/ntap-20240802-0001/
https://www.docker.com/blog/docker-security-advisory-docker-engine-authz-plugin
Configurations

No configuration.

History

21 Nov 2024, 09:32

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/10/msg00009.html -
  • () https://security.netapp.com/advisory/ntap-20240802-0001/ -
References () https://github.com/moby/moby/commit/411e817ddf710ff8e08fa193da80cb78af708191 - () https://github.com/moby/moby/commit/411e817ddf710ff8e08fa193da80cb78af708191 -
References () https://github.com/moby/moby/commit/42f40b1d6dd7562342f832b9cd2adf9e668eeb76 - () https://github.com/moby/moby/commit/42f40b1d6dd7562342f832b9cd2adf9e668eeb76 -
References () https://github.com/moby/moby/commit/65cc597cea28cdc25bea3b8a86384b4251872919 - () https://github.com/moby/moby/commit/65cc597cea28cdc25bea3b8a86384b4251872919 -
References () https://github.com/moby/moby/commit/852759a7df454cbf88db4e954c919becd48faa9b - () https://github.com/moby/moby/commit/852759a7df454cbf88db4e954c919becd48faa9b -
References () https://github.com/moby/moby/commit/a31260625655cff9ae226b51757915e275e304b0 - () https://github.com/moby/moby/commit/a31260625655cff9ae226b51757915e275e304b0 -
References () https://github.com/moby/moby/commit/a79fabbfe84117696a19671f4aa88b82d0f64fc1 - () https://github.com/moby/moby/commit/a79fabbfe84117696a19671f4aa88b82d0f64fc1 -
References () https://github.com/moby/moby/commit/ae160b4edddb72ef4bd71f66b975a1a1cc434f00 - () https://github.com/moby/moby/commit/ae160b4edddb72ef4bd71f66b975a1a1cc434f00 -
References () https://github.com/moby/moby/commit/ae2b3666c517c96cbc2adf1af5591a6b00d4ec0f - () https://github.com/moby/moby/commit/ae2b3666c517c96cbc2adf1af5591a6b00d4ec0f -
References () https://github.com/moby/moby/commit/cc13f952511154a2866bddbb7dddebfe9e83b801 - () https://github.com/moby/moby/commit/cc13f952511154a2866bddbb7dddebfe9e83b801 -
References () https://github.com/moby/moby/commit/fc274cd2ff4cf3b48c91697fb327dd1fb95588fb - () https://github.com/moby/moby/commit/fc274cd2ff4cf3b48c91697fb327dd1fb95588fb -
References () https://github.com/moby/moby/security/advisories/GHSA-v23v-6jw2-98fq - () https://github.com/moby/moby/security/advisories/GHSA-v23v-6jw2-98fq -
References () https://www.docker.com/blog/docker-security-advisory-docker-engine-authz-plugin - () https://www.docker.com/blog/docker-security-advisory-docker-engine-authz-plugin -

30 Jul 2024, 20:15

Type Values Removed Values Added
Summary
  • (es) Moby es un proyecto de código abierto creado por Docker para la contenedorización de software. Se ha detectado una vulnerabilidad de seguridad en determinadas versiones de Docker Engine, que podría permitir a un atacante omitir los complementos de autorización (AuthZ) en circunstancias específicas. La probabilidad básica de que esto sea explotado es baja. Utilizando una solicitud de API especialmente manipulada, un cliente de Engine API podría hacer que el daemon reenvíe la solicitud o respuesta a un complemento de autorización sin el cuerpo. En determinadas circunstancias, el complemento de autorización puede permitir una solicitud que, de otro modo, habría rechazado si se le hubiera enviado el organismo. En 2018 se descubrió un problema de seguridad en el que un atacante podía omitir los complementos de AuthZ mediante una solicitud API especialmente manipulada. Esto podría dar lugar a acciones no autorizadas, incluida la escalada de privilegios. Aunque este problema se solucionó en Docker Engine v18.09.1 en enero de 2019, la solución no se trasladó a versiones principales posteriores, lo que resultó en una regresión. Cualquiera que dependa de complementos de autorización que introspeccionen el cuerpo de solicitud y/o respuesta para tomar decisiones de control de acceso se verá potencialmente afectado. Docker EE v19.03.x y todas las versiones de Mirantis Container Runtime no son vulnerables. docker-ce v27.1.1 contiene parches para corregir la vulnerabilidad. Los parches también se han fusionado en las ramas de versión maestra, 19.0, 20.0, 23.0, 24.0, 25.0, 26.0 y 26.1. Si uno no puede actualizar inmediatamente, evite usar complementos de AuthZ y/o restrinja el acceso a la API de Docker a partes confiables, siguiendo el principio de privilegio mínimo.
Summary (en) Moby is an open-source project created by Docker for software containerization. A security vulnerability has been detected in certain versions of Docker Engine, which could allow an attacker to bypass authorization plugins (AuthZ) under specific circumstances. The base likelihood of this being exploited is low. Using a specially-crafted API request, an Engine API client could make the daemon forward the request or response to an authorization plugin without the body. In certain circumstances, the authorization plugin may allow a request which it would have otherwise denied if the body had been forwarded to it. A security issue was discovered In 2018, where an attacker could bypass AuthZ plugins using a specially crafted API request. This could lead to unauthorized actions, including privilege escalation. Although this issue was fixed in Docker Engine v18.09.1 in January 2019, the fix was not carried forward to later major versions, resulting in a regression. Anyone who depends on authorization plugins that introspect the request and/or response body to make access control decisions is potentially impacted. Docker EE v19.03.x and all versions of Mirantis Container Runtime are not vulnerable. docker-ce v27.1.1 containes patches to fix the vulnerability. Patches have also been merged into the master, 19.0, 20.0, 23.0, 24.0, 25.0, 26.0, and 26.1 release branches. If one is unable to upgrade immediately, avoid using AuthZ plugins and/or restrict access to the Docker API to trusted parties, following the principle of least privilege. (en) Moby is an open-source project created by Docker for software containerization. A security vulnerability has been detected in certain versions of Docker Engine, which could allow an attacker to bypass authorization plugins (AuthZ) under specific circumstances. The base likelihood of this being exploited is low. Using a specially-crafted API request, an Engine API client could make the daemon forward the request or response to an authorization plugin without the body. In certain circumstances, the authorization plugin may allow a request which it would have otherwise denied if the body had been forwarded to it. A security issue was discovered In 2018, where an attacker could bypass AuthZ plugins using a specially crafted API request. This could lead to unauthorized actions, including privilege escalation. Although this issue was fixed in Docker Engine v18.09.1 in January 2019, the fix was not carried forward to later major versions, resulting in a regression. Anyone who depends on authorization plugins that introspect the request and/or response body to make access control decisions is potentially impacted. Docker EE v19.03.x and all versions of Mirantis Container Runtime are not vulnerable. docker-ce v27.1.1 containes patches to fix the vulnerability. Patches have also been merged into the master, 19.03, 20.0, 23.0, 24.0, 25.0, 26.0, and 26.1 release branches. If one is unable to upgrade immediately, avoid using AuthZ plugins and/or restrict access to the Docker API to trusted parties, following the principle of least privilege.

24 Jul 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-24 17:15

Updated : 2024-11-21 09:32


NVD link : CVE-2024-41110

Mitre link : CVE-2024-41110

CVE.ORG link : CVE-2024-41110


JSON object : View

Products Affected

No product.

CWE
CWE-187

Partial String Comparison

CWE-444

Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')

CWE-863

Incorrect Authorization