Leadership Hijacking in Docker Swarm and Its Consequences.

Docker Swarm cloud defense evasion leader election privilege escalation

Journal

Entropy (Basel, Switzerland)
ISSN: 1099-4300
Titre abrégé: Entropy (Basel)
Pays: Switzerland
ID NLM: 101243874

Informations de publication

Date de publication:
19 Jul 2021
Historique:
received: 24 05 2021
revised: 22 06 2021
accepted: 05 07 2021
entrez: 6 8 2021
pubmed: 7 8 2021
medline: 7 8 2021
Statut: epublish

Résumé

With the advent of microservice-based software architectures, an increasing number of modern cloud environments and enterprises use operating system level virtualization, which is often referred to as container infrastructures. Docker Swarm is one of the most popular container orchestration infrastructures, providing high availability and fault tolerance. Occasionally, discovered container escape vulnerabilities allow adversaries to execute code on the host operating system and operate within the cloud infrastructure. We show that Docker Swarm is currently not secured against misbehaving manager nodes. This allows a high impact, high probability privilege escalation attack, which we refer to as leadership hijacking, the possibility of which is neglected by the current cloud security literature. Cloud lateral movement and defense evasion payloads allow an adversary to leverage the Docker Swarm functionality to control each and every host in the underlying cluster. We demonstrate an end-to-end attack, in which an adversary with access to an application running on the cluster achieves full control of the cluster. To reduce the probability of a successful high impact attack, container orchestration infrastructures must reduce the trust level of participating nodes and, in particular, incorporate adversary immune leader election algorithms.

Identifiants

pubmed: 34356455
pii: e23070914
doi: 10.3390/e23070914
pmc: PMC8304174
pii:
doi:

Types de publication

Journal Article

Langues

eng

Auteurs

Adi Farshteindiker (A)

Software and Information Systems Engineering, Ben Gurion University of the Negev, Beer Sheva 8410501, Israel.

Rami Puzis (R)

Software and Information Systems Engineering, Ben Gurion University of the Negev, Beer Sheva 8410501, Israel.
Telekom Innovation Labs, Ben Gurion University of the Negev, Beer Sheva 8410501, Israel.

Classifications MeSH