首页|Docker容器漏洞的逃逸攻击研究

Docker容器漏洞的逃逸攻击研究

扫码查看
随着计算机技术的发展,Docker容器技术具有宿主部署特性,广泛应用到互联网服务中,但软件漏洞引起信息安全问题比较突出.对Docker容器的部署和应用进行了探究,与传统虚拟机技术对比了技术架构和资源应用上的优势.应用虚拟机、镜像部署模拟实际环境,构建一套完整的网络入侵流程,利用Docker高危漏洞CVE-2020-15257、CVE-2019-5736 开展入侵实验,实现容器逃逸并获得宿主主机的高级权限.实验方法有效反映Docker网络入侵的破坏力和安全问题.
Research on Docker Breakout Attack and Defense of Docker Container Vulnerabilities
With the advancement of computer technology,Docker container technology is known for its host deployment characteristics,has found widespread application in internet services.However,the prominence of information security issues arising from software vulnerabilities cannot be overlooked.This research explores the deployment and application of Docker containers,comparing their technical architecture and resource utilization advantages with traditional virtual machine technolo-gy.By deploying virtual machines and image simulations to replicate real-world environments,a comprehensive network intru-sion process is constructed.Intrusion experiments are carried out using high-risk Docker vulnerabilities,namely CVE-2020-15257 and CVE-2019-5736,resulting in container escape and the acquisition of elevated privileges on the host machine.

network securitysoftware vulnerabilitiesDocker escapenetwork intrusion

陈伟、李红存、王剑锋

展开 >

绍兴市公安局,浙江 绍兴 312000

网络安全 软件漏洞 Docker逃逸 网络入侵

2024

工业控制计算机
中国计算机学会工业控制计算机专业委员会 江苏省计算技术研究所有限责任公司

工业控制计算机

影响因子:0.258
ISSN:1001-182X
年,卷(期):2024.37(7)
  • 11