Loading HuntDB...

RCE on 17 different Docker containers on your network

Critical
N
Nextcloud
Submitted None
Reported by 0x0luke

Vulnerability Details

Technical details and impact analysis

Code Injection
## Summary: I was able to get RCE on 17 different docker containers, ranging from postgres and some prod enviroments ## Steps To Reproduce: I found that there was a unconfigured portainer.io service running on http://spreed-demo.nextcloud.com:9000 1. I created an administrator account with the login creds admin:password (please change these credentials!!!) 2. The site redirected me to the portainer backend, which displayed the docker containers running on the box, see first screen shot 3. I was able to fully interact with the docker containers running, the site also allows me to execute arbitrary bash commands on the boxes, See second screenshot Other info that was disclosed to me from the panel: Internal IP addresses, Docker disk volumes Docker images, The docker stacks ## Supporting Material/References: {F1439949} {F1439951} ## Impact An attacker can directly take over each docker container on this system to deploy his own malware, run DDoS attacks etc from inside Nextclouds services.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Code Injection