Miggo Logo

CVE-2019-0204:
Docker image code execution with Apache Mesos

7.8

CVSS Score
3.1

Basic Information

EPSS Score
0.55982%
CWE
-
Published
5/13/2022
Updated
1/30/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.apache.mesos:mesosmaven< 1.4.31.4.3
org.apache.mesos:mesosmaven>= 1.5.0, < 1.5.31.5.3
org.apache.mesos:mesosmaven>= 1.6.0, < 1.6.21.6.2
org.apache.mesos:mesosmaven>= 1.7.0, < 1.7.21.7.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from executing containerizer/executor binaries from writable filesystem paths. The patches introduce memfd cloning to prevent binary replacement. Key vulnerable functions are those that: 1. Constructed command paths using path::join() with launcher_dir 2. Executed binaries via subprocess()/fork() with filesystem paths 3. Initialized container components without memory sealing. The CommandExecutor::launch and MesosContainerizerProcess::_launch functions directly handled binary execution paths prior to memfd protection, making them primary exploitation points.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* sp**i*i**lly *r**t** *o*k*r im*** runnin* un**r t** root us*r **n ov*rwrit* t** init **lp*r *in*ry o* t** *ont*in*r runtim* *n*/or t** *omm*n* *x**utor in *p**** M*sos v*rsions pr*-*.*.x, *.*.* to *.*.*, *.*.* to *.*.*, *.*.* to *.*.*, *n* *.*.* to

Reasoning

T** vuln*r**ility st*ms *rom *x**utin* *ont*in*riz*r/*x**utor *in*ri*s *rom writ**l* *il*syst*m p*t*s. T** p*t***s intro*u** m*m** *lonin* to pr*v*nt *in*ry r*pl***m*nt. K*y vuln*r**l* *un*tions *r* t*os* t**t: *. *onstru*t** *omm*n* p*t*s usin* p*t*