Metasploit: Rancher Server Docker Exploit

Share

We would like to quickly explain and address the recent metasploit
module,
which was created
to exploit Rancher servers and Docker hosts. This is not a security
issue because it only works in the following two scenarios:

1. Your Rancher server does not have authentication enabled

While Rancher does not require you to enable authentication, you should
always enable it if you are deploying Rancher in an untrusted
environment (e.g., publicly exposed to the internet). Instructions can
be found
here. Rancher
currently supports GitHub, SAML, LDAP/AD, Azure AD, OpenLDAP, and local
authentication using our database.

2. Your API keys have been compromised

This is no different from having your username and password compromised,
so please make sure you API keys are stored securely. Rancher provides
you an option to disable and recreate the API keys that have been
compromised. In Rancher 2.0, we will
be further enhancing security by requiring authentication to be enabled
by default. Access to host bind mounts (what is exploited here) will be
privileged, and require that users be granted access. Stay tuned for
more information!

(Visited 1 times, 1 visits today)