RCE on 17 different Docker containers on your network
Critical
N
Nextcloud
Submitted None
Actions:
Reported by
0x0luke
Vulnerability Details
Technical details and impact analysis
## Summary:
I was able to get RCE on 17 different docker containers, ranging from postgres and some prod enviroments
## Steps To Reproduce:
I found that there was a unconfigured portainer.io service running on http://spreed-demo.nextcloud.com:9000
1. I created an administrator account with the login creds admin:password (please change these credentials!!!)
2. The site redirected me to the portainer backend, which displayed the docker containers running on the box, see first screen shot
3. I was able to fully interact with the docker containers running, the site also allows me to execute arbitrary bash commands on the boxes, See second screenshot
Other info that was disclosed to me from the panel:
Internal IP addresses,
Docker disk volumes
Docker images,
The docker stacks
## Supporting Material/References:
{F1439949}
{F1439951}
## Impact
An attacker can directly take over each docker container on this system to deploy his own malware, run DDoS attacks etc from inside Nextclouds services.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Code Injection