Docker daemon socket exposed to containers
ID |
docker_socket_volume |
Severity |
low |
Vendor |
Kubernetes |
Resource |
General Security |
Tags |
reachable |
Examples
apiVersion: v1
kind: Pod
metadata:
name: weak
spec:
containers:
- image: k8s.gcr.io/test-pod
name: test-pod
volumeMounts:
- mountPath: /test-pod
name: test-volume
volumes:
- name: docker-volume
hostPath:
path: /var/run/docker.sock (1)
1 | Having read/write access to socket placed under /var/run/docker.socket means attacker could get access to the host and the others containers. |