Portainer 1.24.1 and earlier is affected by incorrect access control that may lead to remote arbitrary code execution. The restriction checks for bind mounts are applied only on the client-side and not the server-side, which can lead to spawning a container with bind mount. Once such a container is spawned, it can be leveraged to break out of the container leading to complete Docker host machine takeover.
Advisories
Source ID Title
EUVD EUVD EUVD-2020-16999 Portainer 1.24.1 and earlier is affected by incorrect access control that may lead to remote arbitrary code execution. The restriction checks for bind mounts are applied only on the client-side and not the server-side, which can lead to spawning a container with bind mount. Once such a container is spawned, it can be leveraged to break out of the container leading to complete Docker host machine takeover.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T15:12:08.680Z

Reserved: 2020-08-13T00:00:00

Link: CVE-2020-24264

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-03-16T15:15:12.607

Modified: 2024-11-21T05:14:32.907

Link: CVE-2020-24264

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.