33 lines
735 B
YAML
33 lines
735 B
YAML
|
id: exposed-dockerd
|
||
|
|
||
|
info:
|
||
|
name: Docker Daemon Exposed
|
||
|
author: arafat
|
||
|
severity: critical
|
||
|
description: Docker Daemon exposed on the network map can help remote attacker to gain access to the Docker containers and potentially the host system.
|
||
|
metadata:
|
||
|
verified: true
|
||
|
shodan-query: port:2375 product:"docker"
|
||
|
tags: network,docker
|
||
|
|
||
|
network:
|
||
|
- inputs:
|
||
|
- data: "Docker:\nVersion:\n"
|
||
|
|
||
|
host:
|
||
|
- "{{Hostname}}"
|
||
|
- "{{Host}}:2375"
|
||
|
|
||
|
matchers:
|
||
|
- type: word
|
||
|
words:
|
||
|
- "Docker"
|
||
|
|
||
|
extractors:
|
||
|
- type: regex
|
||
|
regex:
|
||
|
- "Version:([0-9.]+)"
|
||
|
- "Kernel Version:([0-9.]+)"
|
||
|
- "API Version:([0-9.]+)"
|
||
|
- "Container #1:([A-Za-z0-9]+)"
|