Skip to content

Commit e394c14

Browse files
1 parent 82a49dc commit e394c14

1 file changed

Lines changed: 107 additions & 0 deletions

File tree

Lines changed: 107 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,107 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-x744-4wpc-v9h2",
4+
"modified": "2026-03-27T17:43:16Z",
5+
"published": "2026-03-27T17:43:16Z",
6+
"aliases": [
7+
"CVE-2026-34040"
8+
],
9+
"summary": "Moby has AuthZ plugin bypass when provided oversized request bodies",
10+
"details": "## Summary\n\nA security vulnerability has been detected that allows attackers to bypass [authorization plugins (AuthZ)](https://docs.docker.com/engine/extend/plugins_authorization/) under specific circumstances. The base likelihood of this being exploited is low.\n\nThis is an incomplete fix for [CVE-2024-41110](https://github.com/moby/moby/security/advisories/GHSA-v23v-6jw2-98fq).\n\n## Impact\n\n**If you don't use AuthZ plugins, you are not affected.**\n\nUsing a specially-crafted API request, an attacker could make the Docker daemon forward the request to an authorization plugin without the body. The authorization plugin may allow a request which it would have otherwise denied if the body had been forwarded to it.\n\nAnyone who depends on authorization plugins that introspect the request body to make access control decisions is potentially impacted.\n\n## Workarounds\n\nIf unable to update immediately:\n- Avoid using AuthZ plugins that rely on request body inspection for security decisions.\n- Restrict access to the Docker API to trusted parties, following the principle of least privilege.\n\n## Credits\n\n- 1seal / Oleh Konko ([@1seal](https://github.com/1seal))\n- Cody (c@wormhole.guru)\n- Asim Viladi Oglu Manizada (@manizada)\n\n## Resources\n\n- [CVE-2024-41110 / GHSA-v23v-6jw2-98fq](https://github.com/moby/moby/security/advisories/GHSA-v23v-6jw2-98fq)",
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Go",
21+
"name": "github.com/moby/moby"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
}
30+
]
31+
}
32+
],
33+
"database_specific": {
34+
"last_known_affected_version_range": "< 29.3.1"
35+
}
36+
},
37+
{
38+
"package": {
39+
"ecosystem": "Go",
40+
"name": "github.com/docker/docker"
41+
},
42+
"ranges": [
43+
{
44+
"type": "ECOSYSTEM",
45+
"events": [
46+
{
47+
"introduced": "0"
48+
}
49+
]
50+
}
51+
],
52+
"database_specific": {
53+
"last_known_affected_version_range": "< 29.3.1"
54+
}
55+
},
56+
{
57+
"package": {
58+
"ecosystem": "Go",
59+
"name": "github.com/moby/moby/v2"
60+
},
61+
"ranges": [
62+
{
63+
"type": "ECOSYSTEM",
64+
"events": [
65+
{
66+
"introduced": "0"
67+
},
68+
{
69+
"fixed": "2.0.0-beta.8"
70+
}
71+
]
72+
}
73+
]
74+
}
75+
],
76+
"references": [
77+
{
78+
"type": "WEB",
79+
"url": "https://github.com/moby/moby/security/advisories/GHSA-v23v-6jw2-98fq"
80+
},
81+
{
82+
"type": "WEB",
83+
"url": "https://github.com/moby/moby/security/advisories/GHSA-x744-4wpc-v9h2"
84+
},
85+
{
86+
"type": "WEB",
87+
"url": "https://github.com/moby/moby/commit/e89edb19ad7de0407a5d31e3111cb01aa10b5a38"
88+
},
89+
{
90+
"type": "WEB",
91+
"url": "https://docs.docker.com/engine/extend/plugins_authorization"
92+
},
93+
{
94+
"type": "PACKAGE",
95+
"url": "https://github.com/moby/moby"
96+
}
97+
],
98+
"database_specific": {
99+
"cwe_ids": [
100+
"CWE-863"
101+
],
102+
"severity": "HIGH",
103+
"github_reviewed": true,
104+
"github_reviewed_at": "2026-03-27T17:43:16Z",
105+
"nvd_published_at": null
106+
}
107+
}

0 commit comments

Comments
 (0)