中危 mobyproject moby 授权机制不正确

CVE编号

CVE-2022-36109

利用情况

暂无

补丁情况

官方补丁

披露时间

2022-09-10
漏洞描述
Moby is an open-source project created by Docker to enable software containerization. A bug was found in Moby (Docker Engine) where supplementary groups are not set up properly. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases, potentially gaining access to sensitive information or gaining the ability to execute code in that container. This bug is fixed in Moby (Docker Engine) 20.10.18. Running containers should be stopped and restarted for the permissions to be fixed. For users unable to upgrade, this problem can be worked around by not using the `"USER $USERNAME"` Dockerfile instruction. Instead by calling `ENTRYPOINT ["su", "-", "user"]` the supplementary groups will be set up properly.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 mobyproject moby * Up to
(excluding)
20.10.18
运行在以下环境
系统 alpine_3.16 docker * Up to
(excluding)
20.10.18-r0
运行在以下环境
系统 alpine_3.17 docker * Up to
(excluding)
20.10.18-r0
运行在以下环境
系统 alpine_3.18 docker * Up to
(excluding)
20.10.18-r0
运行在以下环境
系统 alpine_3.19 docker * Up to
(excluding)
20.10.18-r0
运行在以下环境
系统 amazon_2 docker * Up to
(excluding)
20.10.22-1.amzn2.0.1
运行在以下环境
系统 amazon_2022 containerd * Up to
(excluding)
1.6.8-2.amzn2022.0.1
运行在以下环境
系统 amazon_2023 docker * Up to
(excluding)
20.10.17-1.amzn2023.0.6
运行在以下环境
系统 debian_12 docker.io * Up to
(excluding)
20.10.19+dfsg1-1
运行在以下环境
系统 fedora_36 moby-engine * Up to
(excluding)
20.10.18-1.fc36
运行在以下环境
系统 fedora_37 containerd * Up to
(excluding)
1.6.8-2.fc37
运行在以下环境
系统 kylinos_aarch64_V10SP1 docker-engine * Up to
(excluding)
18.09.0-101.p04.ky10
运行在以下环境
系统 kylinos_aarch64_V10SP2 docker-engine * Up to
(excluding)
18.09.0-202.p02.ky10
运行在以下环境
系统 kylinos_x86_64_V10SP1 docker-engine * Up to
(excluding)
18.09.0-101.p04.ky10
运行在以下环境
系统 kylinos_x86_64_V10SP2 docker-engine * Up to
(excluding)
18.09.0-202.p02.ky10
运行在以下环境
系统 opensuse_5.3 docker * Up to
(excluding)
20.10.23_ce-150000.175.1
运行在以下环境
系统 opensuse_Leap_15.4 docker * Up to
(excluding)
20.10.23_ce-150000.175.1
运行在以下环境
系统 ubuntu_18.04 docker.io * Up to
(excluding)
20.10.21-0ubuntu1~18.04.1
运行在以下环境
系统 ubuntu_20.04 docker.io * Up to
(excluding)
20.10.21-0ubuntu1~20.04.1
运行在以下环境
系统 ubuntu_22.04 docker.io * Up to
(excluding)
20.10.21-0ubuntu1~22.04.1
阿里云评分
5.3
  • 攻击路径
    本地
  • 攻击复杂度
    复杂
  • 权限要求
    普通权限
  • 影响范围
    越权影响
  • EXP成熟度
    未验证
  • 补丁情况
    官方补丁
  • 数据保密性
    无影响
  • 数据完整性
    无影响
  • 服务器危害
    无影响
  • 全网数量
    N/A
CWE-ID 漏洞类型
CWE-863 授权机制不正确
NVD-CWE-Other
阿里云安全产品覆盖情况