Portainer 1.24.1 and earlier is affected by incorrect access control that may lead to remote arbitrary code execution. The restriction checks for bind mounts are applied only on the client-side and not the server-side, which can lead to spawning a container with bind mount. Once such a container is spawned, it can be leveraged to break out of the container leading to complete Docker host machine takeover.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://github.com/portainer/portainer/issues/4106 |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T15:12:08.680Z
Reserved: 2020-08-13T00:00:00
Link: CVE-2020-24264

No data.

Status : Modified
Published: 2021-03-16T15:15:12.607
Modified: 2024-11-21T05:14:32.907
Link: CVE-2020-24264

No data.