This tool is designed to check multiple hosts for vulnerabilities related to CVE-2024-41110 in Docker installations. It specifically looks for vulnerable Docker versions and the use of AuthZ plugins, which can potentially lead to security issues.
- Checks multiple hosts in parallel for efficient scanning
- Detects vulnerable Docker versions
- Identifies usage of AuthZ plugins
- Generates a comprehensive summary report
- Provides a remediation plan for affected hosts
- Supports both password-based and key-based SSH authentication
- Python 3.6 or higher
- Fabric library (
pip install fabric
)
-
Clone this repository:
git clone https://github.com/vvpoglazov/cve-2024-41110-checker.git cd cve-2024-41110-checker
-
Install the required Python library:
pip install fabric
Run the script with the following command:
python cve_2024_41110_checker.py <username> <hosts_file> <output_directory> [-k <key_file>]
<username>
: SSH username for connecting to the hosts<hosts_file>
: Path to a file containing a list of hostnames or IP addresses (one per line)<output_directory>
: Directory where the script will store individual host reports and the summary report-k <key_file>
: (Optional) Path to SSH private key file for authentication
Examples:
Using password-based authentication:
python cve_2024_41110_checker.py admin hosts.txt ./reports
Using key-based authentication:
python cve_2024_41110_checker.py admin hosts.txt ./reports -k /path/to/private_key
If you don't provide the -k
option, the script will prompt you for the SSH password. Using key-based authentication is recommended for better security, especially in production environments.
The script generates two types of output:
- Individual host reports: Detailed information about each host's Docker installation and vulnerability status.
- Summary report: An overview of all scanned hosts, including:
- Total number of hosts checked
- Number of vulnerable hosts
- Number of hosts without Docker running
- Number of hosts with errors during the check
- List of vulnerable hosts with their Docker versions
- Remediation plan
The summary report is both saved to a file and displayed in the console after the script finishes execution.
This tool checks for the following vulnerable Docker versions:
- v19.03.15 and earlier
- v20.10.27 and earlier
- v23.0.14 and earlier
- v24.0.9 and earlier
- v25.0.5 and earlier
- v26.0.2 and earlier
- v26.1.4 and earlier
- v27.0.3 and earlier
- v27.1.0
If vulnerable hosts are detected, consider the following remediation steps:
- Update to the most recent patched version of Docker.
- If immediate update is not possible:
- Avoid using AuthZ plugins
- Restrict access to the Docker API to trusted parties, following the principle of least privilege
This tool is provided as-is, without any warranties. Always test in a controlled environment before using in production.
Contributions, issues, and feature requests are welcome. Feel free to check issues page if you want to contribute.
https://nvd.nist.gov/vuln/detail/CVE-2024-41110
Vladimir Poglazov - GitHub