31 lines
1.2 KiB
YAML
31 lines
1.2 KiB
YAML
id: misconfigured-docker
|
|
|
|
info:
|
|
name: Docker Container - Misconfiguration Exposure
|
|
author: dhiyaneshDK
|
|
severity: critical
|
|
description: A Docker container misconfiguration was discovered. The Docker daemon can listen for Docker Engine API requests via three different types of Socket - unix, tcp, and fd. With tcp enabled, the default setup provides un-encrypted and un-authenticated direct access to the Docker daemon. It is conventional to use port 2375 for un-encrypted, and port 2376 for encrypted communication with the daemon.
|
|
reference:
|
|
- https://madhuakula.com/content/attacking-and-auditing-docker-containers-using-opensource/attacking-docker-containers/misconfiguration.html
|
|
metadata:
|
|
max-request: 1
|
|
tags: misconfig,docker,unauth,devops
|
|
|
|
http:
|
|
- method: GET
|
|
path:
|
|
- "{{BaseURL}}/images/json"
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: word
|
|
words:
|
|
- '"ParentId":'
|
|
- '"Containers":'
|
|
- '"Labels":'
|
|
condition: and
|
|
|
|
- type: status
|
|
status:
|
|
- 200
|
|
# digest: 490a004630440220135e0f07270c19dc3b16f9ec89e22799fc722507e54ebcfbacd6966db61ccd1802205dae62daba720aec195a03ad5ab3aca7facc70e45ad8dc81f2531d298e8dcec1:922c64590222798bb761d5b6d8e72950 |