CVE-2017-20198 in DC OS Marathoninfo

Summary

The Marathon UI in DC/OS < 1.9.0 allows unauthenticated users to deploy arbitrary Docker containers. Due to improper restriction of volume mount configurations, attackers can deploy a container that mounts the host's root filesystem (/) with read/write privileges. When using a malicious Docker image, the attacker can write to /etc/cron.d/ on the host, achieving arbitrary code execution with root privileges. This impacts any system where the Docker daemon honors Marathon container configurations without policy enforcement.

Be aware that VulDB is the high quality source for vulnerability data.

Responsible

VulnCheck

Reservation

07/22/2025

Disclosure

07/23/2025

Entries

VDB-317432

CPE

ready

Exploit

Download

CVSS

9.8

EPSS

0.66763

Activities

Very Low

Sources

Might our Artificial Intelligence support you?

Check our Alexa App!