Help Center/ Cloud Container Engine/ Product Bulletin/ Vulnerability Notices/ Notice of Docker Engine Vulnerability That Allows Attackers to Bypass AuthZ (CVE-2024-41110)
Updated on 2024-08-17 GMT+08:00

Notice of Docker Engine Vulnerability That Allows Attackers to Bypass AuthZ (CVE-2024-41110)

Docker is an open-source container engine. Docker Engine serves as a portable runtime for containers. Docker's authorization plugins (AuthZ) can be used to manage and limit API requests to the Docker daemon.

Description

Table 1 Vulnerability details

Type

CVE-ID

Severity

Discovered

Privilege escalation

CVE-2024-41110

Critical

2024-07-25

Impact

An attacker can exploit this vulnerability using an API request with Content-Length set to 0 to bypass the permissions check. This causes the Docker daemon to forward the request without the body to the AuthZ plugin, potentially allowing unauthorized actions and privilege escalation. Users who do not use the AuthZ plugins or who run Docker Engine of an earlier version are not affected.

CCE uses Huawei-optimized Docker containers and does not enable the AuthZ plugins, so this vulnerability will not be activated.

Identification Method

You can run commands on a node to view the plugins used by Docker.

For a node whose container engine is Docker, run the following command:

ps –elf | grep docker

The following is an example command output:

If --authorization-plugin is not configured, the AuthZ plugins are not enabled. In this case, the vulnerability will not affect this node.

Solution

Docker AuthZ plugins are not enabled in CCE clusters, so this vulnerability (CVE-2024-41110) will not affect nodes in CCE clusters. Do not enable the --authorization-plugin parameter. CCE is going to fix this vulnerability in the optimized Docker containers.