Docker Desktop 4.44.3 Unauthenticated API Exposure
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内,并且不需要特定的开头。首先,我得仔细阅读用户提供的文章内容。 文章标题是Docker Desktop 4.44.3的未认证API暴露漏洞。作者是OilSeller2001,漏洞编号是CVE-2025-9074。描述中提到这个漏洞是由于Docker Engine API在TCP 2375端口上未经过认证暴露,攻击者可以利用这一点来控制Docker daemon,进而访问主机文件系统。 接下来,漏洞细节部分说明了问题所在:如果用户启用了“在tcp://localhost:2375上无TLS暴露守护进程”选项,攻击者就可以通过发送特定的API请求来创建恶意容器,利用绑定挂载功能访问主机敏感目录。 使用步骤包括暴露守护进程、运行PoC脚本等。修复建议包括禁用无认证API、使用TLS证书以及限制网络访问。 现在,我需要将这些信息浓缩到100字以内。重点包括漏洞名称、影响版本、攻击方式、影响结果以及修复措施。 可能的结构:Docker Desktop 4.44.3版本存在未认证API暴露漏洞(CVE-2025-9074),允许攻击者通过发送特定请求控制Docker daemon,导致高权限远程代码执行。修复措施包括禁用无认证API、使用TLS和限制端口访问。 检查字数是否在限制内,并确保信息准确无误。 </think> Docker Desktop 4.44.3版本存在未认证API暴露漏洞(CVE-2025-9074),允许攻击者通过发送特定请求控制Docker daemon,导致高权限远程代码执行。修复措施包括禁用无认证API、使用TLS和限制端口访问。 2026-4-9 20:53:26 Author: cxsecurity.com(查看原文) 阅读量:5 收藏

Docker Desktop 4.44.3 Unauthenticated API Exposure

# Exploit Title: Docker Desktop 4.44.3 - Unauthenticated API Exposure # Date: 2025-10-06 # Exploit Author: OilSeller2001 # Vendor Homepage: https://www.docker.com/ # Software Link: https://www.docker.com/products/docker-desktop/ # Version: Affected on Windows and macOS versions prior to 4.44.3 # Tested on: Windows 11 + Docker Desktop 4.43.0 # Exploit Type: Remote, Local, Shellcode # Platform: Windows # CVE: CVE-2025-9074 # Description: This PoC script exploits a security misconfiguration in the unauthenticated exposure of the Docker Engine API. By sending crafted API requests directly to the Docker daemon, the script creates and starts a specially prepared container. The container leverages the bind mount feature to map sensitive directories from the host filesystem into the container, effectively granting arbitrary access to the host. This results in a high-privilege remote code execution scenario. # Vulnerability Details: The Docker Engine API (TCP port 2375) can be exposed without TLS authentication via the "Expose daemon on tcp://localhost:2375 without TLS" option in Docker Desktop. If this option is enabled, any local or remote attacker with network access to the exposed port can control the Docker daemon without authentication. # Usage: 1. Expose the Docker daemon on TCP 2375 without TLS (testing environment only). 2. Run the PoC against the target: python3 poc_cve_2025_9074.py <target_ip>:2375 3. The script will: - Check API availability - Pull an image - Create a malicious container with bind mounts to the host filesystem - Start the container, allowing access to host files # Mitigation: - Disable the unauthenticated Docker API exposure after testing. - Use TLS certificates if remote API access is required. - Restrict network access to port 2375 via firewall rules. # PoC Download Link: https://github.com/OilSeller2001/PoC-for-CVE-2025-9074



 

Thanks for you comment!
Your message is in quarantine 48 hours.

{{ x.nick }}

|

Date:

{{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1


{{ x.comment }}


文章来源: https://cxsecurity.com/issue/WLB-2026040008
如有侵权请联系:admin#unsafe.sh