First published: Tue Mar 16 2021(Updated: )
Portainer 1.24.1 and earlier is affected by incorrect access control that may lead to remote arbitrary code execution. The restriction checks for bind mounts are applied only on the client-side and not the server-side, which can lead to spawning a container with bind mount. Once such a container is spawned, it can be leveraged to break out of the container leading to complete Docker host machine takeover.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Portainer Portainer | <=1.24.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of Portainer is CVE-2020-24264.
The severity of CVE-2020-24264 is critical.
Portainer version 1.24.1 and earlier are affected by CVE-2020-24264.
CVE-2020-24264 can be exploited by attackers to execute remote arbitrary code by bypassing the incorrect access control in Portainer.
Yes, users should update Portainer to a version that has the fix for CVE-2020-24264 implemented.