Thursday, March 30, 2023
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory
  • Login
  • Register
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
No Result
View All Result
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
No Result
View All Result
Cloud7 News
No Result
View All Result

Home > Cybersecurity > Vulnerability in containerd threats cloud credentials

Vulnerability in containerd threats cloud credentials

A new vulnerability was discovered in containerd, located in the container image-pulling process. This vulnerability has been fixed in containerd 1.2.14. containerd 1.3.


Seda Nur Cinar Seda Nur Cinar
October 27, 2020
2 min read
Vulnerability in containerd threats cloud credentials

Gal Singer, a researcher at Aqua has written about the bug that he found in containerd. The bug (CVE-2020-15157) is located in the container image-pulling process. This vulnerability has been fixed in containerd 1.2.14. containerd 1.3 and later are not affected.

The bug is in the container image-pulling course of action

Containerd is an industry-standard container runtime that is available as a daemon for Linux and Windows. It manages the complete container lifecycle of its host system including image transfer and storage, container execution and supervision, low-level storage, and network attachments.

The new CVE includes manipulation of the image manifest, allowing attackers to craft an image that can leak the host’s registry or cloud credentials when pulled from a registry. In other words, the manifest supports an optional field for an external URL from which content may be fetched, and it can be any registry or domain. This feature is the vulnerable part of the image-pulling process in containerd.

Docker Image Manifest Version 2, Schema 2 documentation
Docker Image Manifest Version 2, Schema 2 documentation

Singer pushed an image to a GCR registry, then pull it from a GKE cluster running vulnerable containerd to simulate the attacks. He saw see a ‘Basic Auth’ header, while looking at our ‘nginx’ weblog. “If we decode it (‘base64’), it turns out to be an authentication token. In our simulation, it is a GCP Service Account OAuth token” he said.

National Vulnerability Database also explained the bug as,

“If an attacker publishes a public image with a manifest that directs one of the layers to be fetched from a web server they control, and they trick a user or system into pulling the image, they can obtain the credentials used for pulling that image,” according to the bug advisory. “In some cases, this may be the user’s username and password for the registry. In other cases, this may be the credentials attached to the cloud virtual instance which can grant access to other cloud resources in the account.”

As Gal Singer said, it is always good practice to periodically verify that you’re using the latest version of the software, as is the case here. This vulnerability was patched in containerd 1.2.4, and containerd 1.3.x was also tested and validated as not vulnerable.

 

See more Cybersecurity News

A comprehensive guide to understanding Cybersecurity: What is Cybersecurity?


Tags: Aqua SecurityVulnerability
Seda Nur Cinar

Seda Nur Cinar

Seda Nur Cinar is the news editor of the Cloud7 News. With more than 8 years of Linux and cloud experience, Seda is a Linux and opensource enthusiast, security researcher and a web application developer.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Next Post
The first OCP Ready facility in China is fully built

The first OCP Ready facility in China is fully built

Related News

How to get Linux ready for gaming

How to get Linux ready for gaming

March 30, 2023 2:45 pm
Trisquel Linux Review: A free and non-proprietary operating system

Trisquel GNU/Linux 11.0 review

Trisquel GNU/Linux 11.0 released, download now

Trisquel GNU/Linux 11.0 released, download now

March 28, 2023 10:20 am
What is a Daemon in Linux?

What is a Daemon in Linux?

March 27, 2023 8:01 pm
Get free daily newsletters from Cloud7 News Get the Cloud7 Newsletter
Select list(s):

Check your inbox or spam folder to confirm your subscription.

By subscribing, you agree to our
Copyright Policy and Privacy Policy

Get the free newsletter

Subscribe to receive the latest IT business updates straight to your inbox.

Select list(s):

Check your inbox or spam folder to confirm your subscription.

Recent News

  • [Event] Grab your DeveloperWeek Europe 2023 ticket free
  • How to get Linux ready for gaming
  • Trisquel GNU/Linux 11.0 review
  • What is continuous testing in DevOps?
  • [Event] FOSSASIA Summit 2023 – Get your discounted ticket now

Cloud7 News
Cloud7 is a news source that publishes the latest news, reviews, comparisons, opinions, and exclusive interviews to help tech users of high-experience levels in the IT industry.

EXPLORE

  • Web Hosting
  • Cloud Computing
  • Data Center
  • Cybersecurity
  • Linux
  • Network/Internet
  • Software
  • Hardware
  • Artificial Intelligence
  • How-Tos
  • Troubleshooting

RESOURCES

  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory

Get the Cloud7 Newsletter

Get FREE daily newsletters from Cloud7 delivering the latest news and reviews.

  • About Us
  • Privacy & Policy
  • Copyright Policy
  • Contact

© 2023, Cloud7 News. All rights reserved.

No Result
View All Result
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory

© 2023, Cloud7 News. All rights reserved.

Welcome Back!

Sign In with Facebook
Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Facebook
Sign Up with Google
Sign Up with Linked In
OR

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.