Potential Security Vulnerability with Docker User Privileges #2371
Closed
singhragvendra503
started this conversation in
General
Replies: 1 comment
-
Thanks for the report! Yes, as the following docs explain, the https://docs.docker.com/engine/install/linux-postinstall/#manage-docker-as-a-non-root-user |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
I've encountered what seems to be a potential security vulnerability in Docker. I'm unsure if this behavior is intended or if it qualifies as a bug.
I'm working on creating a standard user without sudo permissions and adding them to the Docker group. However, even though this user lacks sudo privileges, I've noticed that I can run an Ubuntu container and mount
/etc/sudoers
. Surprisingly, I'm able to edit this file within the container and grant superuser privileges to the previously restricted user.This raises concerns about the integrity of user privileges within Docker containers and their potential exploitation. I'd appreciate any insights or guidance on whether this behavior is expected or if it poses a security risk.
Thank you for your attention to this matter.
https://medium.com/@singhragvendra503/secret-ubuntu-shortcut-bypass-root-elevate-privileges-like-a-pro-87759b778918
Beta Was this translation helpful? Give feedback.
All reactions