Improper Access Control in Marathon UI of DC/OS by Mesosphere
CVE-2017-20198
Key Information:
- Vendor
D2iq, Inc.
- Status
- Vendor
- CVE Published:
- 23 July 2025
Badges
What is CVE-2017-20198?
The Marathon UI in DC/OS versions prior to 1.9.0 is susceptible to a vulnerability that allows unauthenticated users to deploy arbitrary Docker containers. This issue stems from improper restrictions on volume mount configurations, enabling attackers to mount the host's root filesystem with read/write privileges. An exploit could involve deploying a malicious Docker image, potentially allowing the attacker to execute arbitrary code with root privileges by manipulating critical system files like /etc/cron.d/. This vulnerability poses a risk to any system that permits the Docker daemon to engage with Marathon container configurations without appropriate policy enforcement.
Affected Version(s)
DC/OS Marathon * < 1.9.0
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved