Related Articles
All Mix →How FAST Can You Write a Pentest Report?
How FAST Can You Write a Pentest Report? Source link
ZAP Map Local로 쉽게 Fake Response 만들기
Table of Contents Map Local Map Local in ZAP Installation UI Test Fake File Add Map Local Trigger More Ideas Testing with Editor Test to…
ROP and Roll: EXP-301 Offensive Security Exploit Developer (OSED) Review and Exam
The Windows User Mode Exploit Development (EXP-301) course and the accompanying Offensive Security Exploit Developer (OSED) certification is the last of the three courses to…
Vulnerability Deep Dive: Gaining RCE Through ImageMagick With Frans Rosen
Table of Contents The Vulnerability ImageMagick and Related Vulnerabilities Page Description Languages PostScript GhostScript policy.xml The Exploit Script Breakdown Conclusion Sources The file upload vulnerability…
How HackerOne Reinvented Security for Developers
Table of Contents Workflow Integration Validation for Deterministic Warnings Validation for Non-Deterministic Risks Feedback Loops That Listen and LearnWhat if a security risk can’t be…
Grammarly CISO Suha Can Discusses the Impact of Preemptive Security with HackerOne
The allure of generative AI and the importance of the basics. While the advent of generative AI poses new challenges, it’s important not to neglect…


Impact
When using
--userns-remap, if the root user in the remapped namespace has access to the host filesystem they can modify files under/var/lib/docker/that cause writing files with extended privileges.Patches
Versions 20.10.3 and 19.03.15 contain patches that prevent privilege escalation from remapped user.
Credits
Maintainers would like to thank Alex Chapman for discovering the vulnerability; @awprice, @nathanburrell, @raulgomis, @chris-walz, @erin-jensby, @BassMatt, @mark-adams, @dbaxa for working on it and Zac Ellis for responsibly disclosing it to security@docker.com