← Zuruck zu CVEs
CVE-2026-24740
CRITICAL9.9
Beschreibung
Dozzle is a realtime log viewer for docker containers. Prior to version 9.0.3, a flaw in Dozzle’s agent-backed shell endpoints allows a user restricted by label filters (for example, `label=env=dev`) to obtain an interactive root shell in out‑of‑scope containers (for example, `env=prod`) on the same agent host by directly targeting their container IDs. Version 9.0.3 contains a patch for the issue.
CVE Details
CVSS v3.1 Bewertung9.9
SchweregradCRITICAL
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienLOW
BenutzerinteraktionNONE
Veroffentlicht1/27/2026
Zuletzt geandert2/19/2026
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
amirraminfar:dozzle
Schwachen (CWE)
CWE-284CWE-863CWE-863
Referenzen
https://github.com/amir20/dozzle/commit/620e59aa246347ba8a27e68c532853b8a5137bc1(security-advisories@github.com)
https://github.com/amir20/dozzle/releases/tag/v9.0.3(security-advisories@github.com)
https://github.com/amir20/dozzle/security/advisories/GHSA-m855-r557-5rc5(security-advisories@github.com)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.