The Marathon UI in DC/OS < 1.9.0 allows unauthenticated users to deploy arbitrary Docker containers. Due to improper restriction of volume mount configurations, attackers can deploy a container that mounts the host's root filesystem (/) with read/write privileges. When using a malicious Docker image, the attacker can write to /etc/cron.d/ on the host, achieving arbitrary code execution with root privileges. This impacts any system where the Docker daemon honors Marathon container configurations without policy enforcement.
Metrics
Affected Vendors & Products
References
History
Wed, 23 Jul 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 23 Jul 2025 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Marathon UI in DC/OS < 1.9.0 allows unauthenticated users to deploy arbitrary Docker containers. Due to improper restriction of volume mount configurations, attackers can deploy a container that mounts the host's root filesystem (/) with read/write privileges. When using a malicious Docker image, the attacker can write to /etc/cron.d/ on the host, achieving arbitrary code execution with root privileges. This impacts any system where the Docker daemon honors Marathon container configurations without policy enforcement. | |
| Title | DC/OS Marathon UI < 1.9.0 Unauthenticated RCE via Docker Mount Abuse | |
| Weaknesses | CWE-732 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-07-23T13:50:52.047Z
Updated: 2025-07-23T14:51:09.733Z
Reserved: 2025-07-22T19:22:02.304Z
Link: CVE-2017-20198
Updated: 2025-07-23T14:50:57.208Z
Status : Awaiting Analysis
Published: 2025-07-23T14:15:32.140
Modified: 2025-07-25T15:29:44.523
Link: CVE-2017-20198
No data.