Docker Remote API Unauthorized Access Vulnerability Exploitation Tool
CSTR:
Author:
Affiliation:

Clc Number:

Fund Project:

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
  • |
  • Comments
    Abstract:

    Through the analysis of Docker Remote API Unauthorized Access Vulnerability, this paper proposes a vulnerability exploitation tool. The tool fills the gap of vulnerability detection tools and provides the batch testing function. It achieves high efficiency of vulnerability detection and lays the foundation for web security work such as bug fixes. It is effective and has low cost for the improvement of web security.

    Reference
    Related
    Cited by
Get Citation

孙建,蔡翔,王潇,夏雨潇. Docker Remote API未授权访问漏洞利用工具.计算机系统应用,2017,26(8):247-251

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:November 21,2016
  • Revised:
  • Adopted:
  • Online: October 31,2017
  • Published:
Article QR Code
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063