Description
The Marathon UI in DC/OS < 1.9.0 allows unauthenticated users to deploy arbitrary Docker containers. Due to improper restriction of volume mount configurations, attackers can deploy a container that mounts the host's root filesystem (/) with read/write privileges. When using a malicious Docker image, the attacker can write to /etc/cron.d/ on the host, achieving arbitrary code execution with root privileges. This impacts any system where the Docker daemon honors Marathon container configurations without policy enforcement.
INFO
Published Date :
2025-07-23T13:50:52.047Z
Last Modified :
2026-04-07T14:03:37.115Z
Source :
VulnCheck
AFFECTED PRODUCTS
The following products are affected by CVE-2017-20198 vulnerability.
No data.
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2017-20198.