Miggo Logo

CVE-2014-6408: Access Restriction Bypass in Docker

5

CVSS Score

Basic Information

EPSS Score
0.81232%
Published
2/15/2022
Updated
1/9/2023
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
AV:N/AC:L/Au:N/C:N/I:P/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/docker/dockergo>= 1.3.0, < 1.3.21.3.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from Docker processing security options (SecurityOpt) from image configurations (Config struct) rather than runtime configurations (HostConfig). The commit diff shows SecurityOpt was moved from Config to HostConfig, and parseSecurityOpt() was modified to accept HostConfig. Previously, when parseSecurityOpt() was called during container initialization (via newContainer()) using the image's Config, attackers could embed malicious SecurityOpt in images. By moving SecurityOpt handling to HostConfig (runtime settings) and invoking parseSecurityOpt() later in setHostConfig(), the patch ensured security options are controlled by the user/administrator, not the image.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*o*k*r *.*.* t*rou** *.*.* *llows r*mot* *tt**k*rs to mo*i*y t** ****ult run pro*il* o* im*** *ont*in*rs *n* possi*ly *yp*ss t** *ont*in*r *y *pplyin* unsp**i*i** s**urity options to *n im***.

Reasoning

T** vuln*r**ility st*mm** *rom *o*k*r pro**ssin* s**urity options (S**urityOpt) *rom im*** *on*i*ur*tions (*on*i* stru*t) r*t**r t**n runtim* *on*i*ur*tions (*ost*on*i*). T** *ommit *i** s*ows `S**urityOpt` w*s mov** *rom `*on*i*` to `*ost*on*i*`, *n