Description
Portainer 1.24.1 and earlier is affected by incorrect access control that may lead to remote arbitrary code execution. The restriction checks for bind mounts are applied only on the client-side and not the server-side, which can lead to spawning a container with bind mount. Once such a container is spawned, it can be leveraged to break out of the container leading to complete Docker host machine takeover.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-16999 | Portainer 1.24.1 and earlier is affected by incorrect access control that may lead to remote arbitrary code execution. The restriction checks for bind mounts are applied only on the client-side and not the server-side, which can lead to spawning a container with bind mount. Once such a container is spawned, it can be leveraged to break out of the container leading to complete Docker host machine takeover. |
References
| Link | Providers |
|---|---|
| https://github.com/portainer/portainer/issues/4106 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T15:12:08.680Z
Reserved: 2020-08-13T00:00:00.000Z
Link: CVE-2020-24264
No data.
Status : Modified
Published: 2021-03-16T15:15:12.607
Modified: 2024-11-21T05:14:32.907
Link: CVE-2020-24264
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD