Metasploit: Rancher Server Docker Exploit

Will Chan
Will Chan
Gray Calendar Icon Published: October 9, 2017
Gray Calendar Icon Updated: January 26, 2021

We would like to quickly explain and address the recent metasploit module, which was created to exploit Rancher servers and Docker hosts. This is not a security issue because it only works in the following two scenarios:

1. Your Rancher server does not have authentication enabled

While Rancher does not require you to enable authentication, you should always enable it if you are deploying Rancher in an untrusted environment (e.g., publicly exposed to the internet). Instructions can be found here. Rancher currently supports GitHub, SAML, LDAP/AD, Azure AD, OpenLDAP, and local authentication using our database.

2. Your API keys have been compromised

This is no different from having your username and password compromised, so please make sure you API keys are stored securely. Rancher provides you an option to disable and recreate the API keys that have been compromised. In Rancher 2.0, we will be further enhancing security by requiring authentication to be enabled by default. Access to host bind mounts (what is exploited here) will be privileged, and require that users be granted access. Stay tuned for more information!

Will Chan
Will Chan
Co-founder and Vice President of Engineering
Prior to Rancher, Will was Director of Engineering for the CloudPlatforms group at Citrix System after their acquisition of, where he held a similar position and was one of the original founding engineers. Will has over 15 years of experience of building massively scalable software for large enterprises and telcos and has held lead engineering positions at SEVEN Networks, Openwave Systems, and Cambridge Technology Partners. Will has a B.S (EECS) from the University of California, Berkeley.
Get started with Rancher