Docker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host Access
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。用户已经提供了文章内容和示例回复,我得先仔细阅读文章,理解其主要内容。 这篇文章主要讲的是Docker Engine发现了一个高危漏洞CVE-2026-34040,CVSS评分8.8。这个漏洞是由于之前修复另一个漏洞CVE-2024-41110时没有完全解决,导致攻击者可以利用精心构造的API请求绕过授权插件。攻击者通过填充请求体到超过1MB,使得插件无法正确处理,从而允许创建特权容器,访问宿主机文件系统。此外,AI代理如OpenClaw也可能被利用来执行恶意代码。文章还提到了临时的修复措施,比如避免依赖请求体的AuthZ插件、限制Docker API访问以及使用rootless模式运行Docker。 接下来,我需要将这些信息浓缩到100字以内。重点包括:漏洞名称、CVSS评分、影响(绕过AuthZ插件)、攻击者如何利用(填充请求体)、可能造成的后果(创建特权容器、访问宿主机)、AI代理的风险以及修复建议。 现在组织语言:Docker Engine发现高危漏洞CVE-2026-34040(CVSS 8.8),源于未完全修复CVE-2024-41110。攻击者可构造API请求绕过授权插件,创建特权容器并访问宿主机文件系统。AI代理可能被利用触发漏洞。建议升级至29.3.1版本,并采取限制API访问或使用rootless模式等措施。 检查字数是否在限制内,并确保信息准确无误。 </think> Docker Engine发现高危漏洞CVE-2026-34040(CVSS 8.8),源于未完全修复CVE-2024-41110。攻击者可构造API请求绕过授权插件,创建特权容器并访问宿主机文件系统。AI代理可能被利用触发漏洞。建议升级至29.3.1版本,并采取限制API访问或使用rootless模式等措施。 2026-4-7 15:15:0 Author: thehackernews.com(查看原文) 阅读量:7 收藏

Vulnerability / DevSecOps

A high-severity security vulnerability has been disclosed in Docker Engine that could permit an attacker to bypass authorization plugins (AuthZ) under specific circumstances.

The vulnerability, tracked as CVE-2026-34040 (CVSS score: 8.8), stems from an incomplete fix for CVE-2024-41110, a maximum-severity vulnerability in the same component that came to light in July 2024.

"Using a specially-crafted API request, an attacker could make the Docker daemon forward the request to an authorization plugin without the body," Docker Engine maintainers said in an advisory released late last month. "The authorization plugin may allow a request which it would have otherwise denied if the body had been forwarded to it."

"Anyone who depends on authorization plugins that introspect the request body to make access control decisions is potentially impacted."

Multiple security vulnerabilities, including Asim Viladi Oglu Manizada, Cody, Oleh Konko, and Vladimir Tokarev, have been credited with independently discovering and reporting the bug. The issue has been patched in Docker Engine version 29.3.1.

According to a report published by Cyera Research Labs researcher Tokarev, the vulnerability stems from the fact that the fix for CVE-2024-41110 did not properly handle oversized HTTP request bodies, thereby opening the door to a scenario where a single padded HTTP request can be used to create a privileged container with host file system access.

In a hypothetical attack scenario, an attacker who has Docker API access restricted by an AuthZ plugin can undermine the mechanism by padding a container creation request to more than 1MB, causing it to be dropped before reaching the plugin.

"The plugin allows the request because it sees nothing to block," Tokarev said in a report shared with The Hacker News. "The Docker daemon processes the full request and creates a privileged container with root access to the host: your AWS credentials, SSH keys, Kubernetes configs, and everything else on the machine. This works against every AuthZ plugin in the ecosystem."

What's more, an artificial intelligence (AI) coding agent like OpenClaw running inside a Docker-based sandbox can be tricked into executing a prompt injection concealed within a specifically crafted GitHub repository as part of a regular developer workflow, resulting in the execution of malicious code that exploits CVE-2026-34040 to bypass authorization using the above approach and create a privileged container and mount the host file system.

With this level of access in place, the attacker can extract credentials for cloud services, and abuse them to take control of cloud accounts, Kubernetes clusters, and even SSH into production servers.

It doesn't end there. Cyera also cautioned that AI agents can figure out the bypass on their own and trigger it by constructing a padded HTTP request upon encountering errors when attempting to access files like kubeconfig as part of a legitimate debugging task issued by a developer (e.g., debug the K8s out-of-memory issue). This approach eliminates the need for planting a poisoned repository containing the malicious instructions.

"AuthZ plugin denied the mount request," Cyera explained. "The agent has access to the Docker API and knows how HTTP works. CVE-2026-34040 doesn't require any exploit code, privilege, or special tools. It's a single HTTP request with extra padding. Any agent that can read Docker API documentation can construct it."

As temporary workarounds, it's recommended to avoid using AuthZ plugins that rely on request body inspection for security decisions, limit access to the Docker API to trusted parties by following the principle of least privilege, or run Docker in rootless mode.

"In rootless mode, even a privileged container's 'root' maps to an unprivileged host UID," Tokarev said. "The blast radius drops from 'full host compromise' to 'compromised unprivileged user.' For environments that can't go fully rootless, --userns-remap provides similar UID mapping."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/04/docker-cve-2026-34040-lets-attackers.html
如有侵权请联系:admin#unsafe.sh