Article
Version 1
Preserved in Portico This version is not peer-reviewed
Leadership Hijacking in Docker Swarm and Its Consequences
Version 1
: Received: 24 May 2021 / Approved: 25 May 2021 / Online: 25 May 2021 (08:57:28 CEST)
A peer-reviewed article of this Preprint also exists.
Farshteindiker, A.; Puzis, R. Leadership Hijacking in Docker Swarm and Its Consequences. Entropy 2021, 23, 914. Farshteindiker, A.; Puzis, R. Leadership Hijacking in Docker Swarm and Its Consequences. Entropy 2021, 23, 914.
DOI: 10.3390/e23070914
Abstract
With the advent of microservice-based software architectures, an increasing number of modern cloud environments and enterprises use operating system level virtualization, often referred to as containers. Docker Swarm is one of the most popular container orchestration infrastructures, providing high availability and fault tolerance. Occasionally discovered container escape vulnerabilities allow adversaries to execute code on the host operating system and operate within the cloud infrastructure. We show that docker swarm is currently not secured against misbehaving manager nodes and allows a high impact, high probability privilege escalation attack that we refer to as leadership hijacking. Cloud lateral movement and defense evasion payloads allow an adversary to leverage the docker swarm functionality to control each and every host in the underlying cluster. We demonstrate an end-to-end attack, in which an adversary with access to an application running on the cluster achieves full control of the cluster. To reduce the probability of a successful high impact attack, container orchestration infrastructures must reduce the trust level of participating nodes and in particular, incorporate adversary immune leader election algorithms.
Keywords
docker swarm; leader election; privilege escalation; defense evasion; cloud
Subject
Computer Science and Mathematics, Algebra and Number Theory
Copyright: This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Comments (0)
We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.
Leave a public commentSend a private comment to the author(s)