Home / Vulnerability Database / Config files : Docker daemon socket exposure
Config files

Config files : Docker daemon socket exposure

Classification

Overview

If your docker daemon is running with -H tcp://0.0.0.0:XXX or similar it is exposing un-encrypted and un-authenticated direct access to the Docker daemon.

MEDIUM

DerScanner Severity Score

Do you want to fix Config files : Docker daemon socket exposure in your application?

See also

Config files

Config files : Text4Shell Vulnerability

Config files

Config files : Incorrect directory deletion

Config files

Config files : Code injection