Dozzle is a realtime log viewer for docker containers. Prior to version 9.0.3, a flaw in Dozzle’s agent-backed shell endpoints allows a user restricted by label filters (for example, `label=env=dev`) to obtain an interactive root shell in out‑of‑scope containers (for example, `env=prod`) on the same agent host by directly targeting their container IDs. Version 9.0.3 contains a patch for the issue.
References
| Link | Resource |
|---|---|
| https://github.com/amir20/dozzle/commit/620e59aa246347ba8a27e68c532853b8a5137bc1 | Patch |
| https://github.com/amir20/dozzle/releases/tag/v9.0.3 | Product Release Notes |
| https://github.com/amir20/dozzle/security/advisories/GHSA-m855-r557-5rc5 | Exploit Mitigation Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-01-27 21:16
Updated : 2026-02-19 21:30
NVD link : CVE-2026-24740
Mitre link : CVE-2026-24740
CVE.ORG link : CVE-2026-24740
JSON object : View
Products Affected
amirraminfar
- dozzle
