Docker Desktop < 4.67.0 SSRF

medium Nessus Plugin ID 304668

Synopsis

The remote host has an application installed that is affected by a server-side request forgery vulnerability.

Description

The version of Docker Desktop is prior to 4.67.0. It is therefore affected by a server-side request forgery vulnerability.

- Docker Model Runner contains an SSRF vulnerability in its OCI registry token exchange flow. When pulling a model, Model Runner follows the realm URL from the registry’s WWW-Authenticate header without validating the scheme, hostname, or IP range. A malicious OCI registry can set the realm to an internal URL (e.g., http://127.0.0.1:3000/), causing Model Runner running on the host to make arbitrary GET requests to internal services and reflect the full response body back to the caller. Additionally, the token exchange mechanism can relay data from internal services back to the attacker-controlled registry via the Authorization: Bearer header. (CVE-2026-33990)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Docker Desktop version 4.67.0 or later

See Also

https://docs.docker.com/security/security-announcements/

https://docs.docker.com/desktop/release-notes/#4670

Plugin Details

Severity: Medium

ID: 304668

File Name: docker_cve-2026-33990.nasl

Version: 1.2

Type: Local

Agent: windows, macosx, unix

Family: Misc.

Published: 4/2/2026

Updated: 4/3/2026

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v3

Risk Factor: Medium

Base Score: 6.5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

Vulnerability Information

CPE: cpe:/a:docker:docker

Patch Publication Date: 3/30/2026

Vulnerability Publication Date: 3/30/2026

Reference Information

CVE: CVE-2026-33990

IAVA: 2026-A-0284