nuclei-templates/http/misconfiguration/misconfigured-docker.yaml

31 lines
1.2 KiB
YAML
Raw Normal View History

2021-02-03 18:18:23 +00:00
id: misconfigured-docker
info:
name: Docker Container - Misconfiguration Exposure
2021-02-03 18:18:23 +00:00
author: dhiyaneshDK
2021-02-10 11:17:48 +00:00
severity: critical
description: A Docker container misconfiguration was discovered. The Docker daemon can listen for Docker Engine API requests via three different types of Socket - unix, tcp, and fd. With tcp enabled, the default setup provides un-encrypted and un-authenticated direct access to the Docker daemon. It is conventional to use port 2375 for un-encrypted, and port 2376 for encrypted communication with the daemon.
reference:
- https://madhuakula.com/content/attacking-and-auditing-docker-containers-using-opensource/attacking-docker-containers/misconfiguration.html
metadata:
max-request: 1
2024-01-14 09:21:50 +00:00
tags: misconfig,docker,unauth,devops
2021-02-03 18:18:23 +00:00
http:
2021-02-03 18:18:23 +00:00
- method: GET
path:
- "{{BaseURL}}/images/json"
matchers-condition: and
matchers:
- type: word
words:
2021-02-14 17:51:42 +00:00
- '"ParentId":'
- '"Containers":'
2021-02-14 17:51:42 +00:00
- '"Labels":'
condition: and
2021-02-03 18:18:23 +00:00
- type: status
status:
- 200
# digest: 4a0a0047304502210097976ad2a503f1f9dbccd24f87cbd25f93a42f7cd8b2b7348d516621574fddfa022065fa1ce782dfdd982dc3ca4fe9fe12d94aa606fc77ca21acb65b859132ef5da7:922c64590222798bb761d5b6d8e72950