← Back to CVEs
CVE-2020-24264
CRITICAL9.8
Description
Portainer 1.24.1 and earlier is affected by incorrect access control that may lead to remote arbitrary code execution. The restriction checks for bind mounts are applied only on the client-side and not the server-side, which can lead to spawning a container with bind mount. Once such a container is spawned, it can be leveraged to break out of the container leading to complete Docker host machine takeover.
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published3/16/2021
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
portainer:portainer
Weaknesses (CWE)
CWE-863
References
https://github.com/portainer/portainer/issues/4106(cve@mitre.org)
https://github.com/portainer/portainer/issues/4106(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.