docker-logo-blog-header

On the evening of September 6th, a vulnerability in the App Center repository server became known that allowed Docker images to be manipulated for Docker based apps. The vulnerability was in the Docker registry for the Univention App Center and allowed anonymous push of Docker images. The problem was fixed the following day by locking the anonymous push again.

The Univention Docker registry is part of the App Center repository and download source for the Docker based apps in the App Center. An anonymous push means that a potential attacker could upload their own Docker images to the registry or replace existing images and manipulate apps. So far, we have no indication that the vulnerability has been exploited and apps have been manipulated.

The reason for the vulnerability is a misconfiguration of the Univention Docker registry. The App Center team is currently analyzing whether pushes have occurred outside Univention. It also ensures that the images provided match the originals and are not tampered with. This work is still in progress.

For administrators of UCS environments there is currently no need for action.

In order to rule out a future configuration that allows a new anonymous push, an automated test has already been implemented that regularly checks the Univention Docker Registry.

We will report on the progress of the work here in the blog.

Use UCS Core Edition for Free!

Download now

Nico Gulden studied applied computer science and works for Univention since 2010. He is responsible for the Product Management and the relationship management of the App vendors in the Univention App Center. His spare time is dedicated to his family, reading, outdoor activities light photography, Geocaching and mapping for the OpenStreetMap project.

What's your opinion? Leave a comment!

Comments

  1. We have evaluated the log files of the Univention Docker Registry and examined them for any conspicuous push operations. We could not identify any unwanted image pushes.

Your email address will not be published. Required fields are marked *