Incorrect Authorization Affecting github.com/moby/moby/pkg/authorization package, versions >=19.3.0-beta1 <25.0.6 >=26.0.0 <26.1.5 >=27.0.0-rc.1 <27.1.1


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team

    Threat Intelligence

    EPSS
    0.05% (16th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-GOLANG-GITHUBCOMMOBYMOBYPKGAUTHORIZATION-7573312
  • published 30 Jul 2024
  • disclosed 29 Jul 2024
  • credit Cory Snider

How to fix?

Upgrade github.com/moby/moby/pkg/authorization to version 25.0.6, 26.1.5, 27.1.1 or higher.

Overview

Affected versions of this package are vulnerable to Incorrect Authorization using an API request with Content-Length set to 0, causing the Docker daemon to forward the request without the body to the AuthZ plugin, which might approve the request incorrectly if not set to deny by default

Note:

  1. Users with access to the Docker daemon can execute any Docker command, authorization plugins (AuthZ), approve or deny requests to the Docker daemon based on authentication and command context.

A security issue was discovered where an attacker could bypass AuthZ plugins using a specially crafted API request. This could lead to unauthorized actions, including privilege escalation. Although this issue was fixed in Docker Engine v18.09.1, the fix was not carried forward to later versions, resulting in a regression.

  1. Users of Docker Engine v19.03.x and later versions who do not rely on authorization plugins to make access control decisions and users of all versions of Mirantis Container Runtime and users of Docker commercial products and internal infrastructure who do not rely on AuthZ plugins are unaffected.

Workaround

Restrict access to the Docker API to trusted parties, following the principle of least privilege.

CVSS Scores

version 4.0
version 3.1
Expand this section

Snyk

Recommended
8.7 high
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Attack Requirements (AT)
    None
  • Privileges Required (PR)
    Low
  • User Interaction (UI)
    None
  • Confidentiality (VC)
    High
  • Integrity (VI)
    High
  • Availability (VA)
    High
  • Confidentiality (SC)
    None
  • Integrity (SI)
    None
  • Availability (SA)
    None