logoalt Hacker News

cobertoslast Thursday at 3:39 AM1 replyview on HN

Luckily umami in docker is pretty compartimentalized. All data is in the and the DB runs in another container. The biggest thing is the DB credentials. The default config requires no volume mounts so no worries there. It runs unprivileged with no extra capabilities. IIRC don't think the container even has bash, a few of the exploits that tried to run weren't able to due to lack of bash in the scripts they ran.

Deleting and remaking the container will blow away all state associated with it. So there isn't a whole lot to worry about after you do that.


Replies

simulator5glast Thursday at 7:52 PM

You could just chain this with another exploit, just because it doesn’t run as root by default doesn’t mean it’s not a big deal.