Giter Club home page Giter Club logo

docker's Introduction

Docker

Usage

Run this command:

docker run -p 8080:80 -it -d ghcr.io/ldapaccountmanager/lam:stable

Then access LAM at http://localhost:8080/

You can change the port 8080 if needed.

Configuration files are stored in:

/etc/ldap-account-manager
/var/lib/ldap-account-manager

See possible environment variables here: https://github.com/LDAPAccountManager/lam/blob/develop/lam-packaging/docker/.env

Mount Configuration Files from Outside

docker run -p 8080:80 -it -d --volume /data/lam/config:/var/lib/ldap-account-manager/config --env LAM_SKIP_PRECONFIGURE=true ghcr.io/ldapaccountmanager/lam:stable

In case you need to provision from scratch please download the tar.bz2 file first. Then use the content of its config folder for the config volume.

Proxy with nginx

Example for publishing LAM via e.g. jwilder/nginx-proxy proxy.

docker run --name lam.example.com --hostname lam.example.com --env VIRTUAL_HOST=lam.example.com --env VIRTUAL_PORT=80 --expose 80 ghcr.io/ldapaccountmanager/lam:stable

LAM Pro:

Please request access at support for Azure.

docker login lampro.azurecr.io

docker pull lampro.azurecr.io/lampro

docker run -p 8080:80 -it -d lampro.azurecr.io/lampro:stable

docker's People

Contributors

gruberroland avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar

docker's Issues

Docker lam 8.6 : apache Vulnerability

On lam 8.6 latest stable docker release
Tenable report apache version is vulnerable:

Synopsis

The remote web server is affected by multiple vulnerabilities.
Description

The version of Apache httpd installed on the remote host is prior to 2.4.58. It is, therefore, affected by multiple vulnerabilities as referenced in the 2.4.58 advisory.

  • mod_macro buffer over-read: Out-of-bounds Read vulnerability in mod_macro of Apache HTTP Server.This issue affects Apache HTTP Server: through 2.4.57. Acknowledgements: finder: David Shoon (github/davidshoon) (CVE-2023-31122)

  • Apache HTTP Server: DoS in HTTP/2 with initial windows size 0: An attacker, opening a HTTP/2 connection with an initial window size of 0, was able to block handling of that connection indefinitely in Apache HTTP Server. This could be used to exhaust worker resources in the server, similar to the well known slow loris attack pattern. This has been fixed in version 2.4.58, so that such connection are terminated properly after the configured connection timeout. This issue affects Apache HTTP Server: from 2.4.55 through 2.4.57. Users are recommended to upgrade to version 2.4.58, which fixes the issue.
    Acknowledgements: (CVE-2023-43622)

  • Apache HTTP Server: HTTP/2 stream memory not reclaimed right away on RST: When a HTTP/2 stream was reset (RST frame) by a client, there was a time window were the request's memory resources were not reclaimed immediately. Instead, de-allocation was deferred to connection close. A client could send new requests and resets, keeping the connection busy and open and causing the memory footprint to keep on growing. On connection close, all resources were reclaimed, but the process might run out of memory before that. This was found by the reporter during testing of CVE-2023-44487 (HTTP/2 Rapid Reset Exploit) with their own test client. During normal HTTP/2 use, the probability to hit this bug is very low. The kept memory would not become noticeable before the connection closes or times out. Users are recommended to upgrade to version 2.4.58, which fixes the issue. Acknowledgements: (CVE-2023-45802)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
Steps to Remediate

Upgrade to Apache version 2.4.58 or later.

Risk Information

CVSS v2 Severity: High

In the docker container, when I check the apache version :
image

sed: can't read /etc/ldap-account-manager/config.cfg: No such file or directory

When I mount volumes to store config files outside I get the following error on startup:

sed: can't read /etc/ldap-account-manager/config.cfg: No such file or directory

I'm on macOS.
I'm using the following docker-compose file:

services:
  lam:
    container_name: lam
    image: ghcr.io/ldapaccountmanager/lam:stable
    ports:
      - 8090:80
    env_file:
      - .env
    volumes:
      - ./data/lam/etc/:/etc/ldap-account-manager
      - ./data/lam/lib/:/var/lib/ldap-account-manager

lam 8.5 stable docker image : Apache 2.4.x < 2.4.58 Multiple Vulnerabilities

In docker image ldap account manager 8.5 stable, we hase some vulnerability issue with apache version.

The version of Apache httpd installed on the remote host is prior to 2.4.58. It is, therefore, affected by multiple vulnerabilities as referenced in the 2.4.58 advisory.

  • mod_macro buffer over-read: Out-of-bounds Read vulnerability in mod_macro of Apache HTTP Server.This issue affects Apache HTTP Server: through 2.4.57. Acknowledgements: finder: David Shoon (github/davidshoon) (CVE-2023-31122)

  • Apache HTTP Server: DoS in HTTP/2 with initial windows size 0: An attacker, opening a HTTP/2 connection with an initial window size of 0, was able to block handling of that connection indefinitely in Apache HTTP Server. This could be used to exhaust worker resources in the server, similar to the well known slow loris attack pattern. This has been fixed in version 2.4.58, so that such connection are terminated properly after the configured connection timeout. This issue affects Apache HTTP Server: from 2.4.55 through 2.4.57. Users are recommended to upgrade to version 2.4.58, which fixes the issue.
    Acknowledgements: (CVE-2023-43622)

  • Apache HTTP Server: HTTP/2 stream memory not reclaimed right away on RST: When a HTTP/2 stream was reset (RST frame) by a client, there was a time window were the request's memory resources were not reclaimed immediately. Instead, de-allocation was deferred to connection close. A client could send new requests and resets, keeping the connection busy and open and causing the memory footprint to keep on growing. On connection close, all resources were reclaimed, but the process might run out of memory before that. This was found by the reporter during testing of CVE-2023-44487 (HTTP/2 Rapid Reset Exploit) with their own test client. During normal HTTP/2 use, the probability to hit this bug is very low. The kept memory would not become noticeable before the connection closes or times out.

  • Users are recommended to upgrade to version 2.4.58, which fixes the issue. Acknowledgements: (CVE-2023-45802)

Docker lam 8.6 : apache Vulnerability - Web Server HTTP Header Internal IP Disclosure

Description :
`This may expose internal IP addresses that are usually hidden or masked behind a Network Address Translation (NAT) Firewall or proxy server.

There is a known issue with Microsoft IIS 4.0 doing this in its default configuration. This may also affect other web servers, web applications, web proxies, load balancers and through a variety of misconfigurations related to redirection.`

Output from most recent scan

Nessus was able to exploit the issue using the following request :

GET / HTTP/1.0
Accept-Charset: iso-8859-1,utf-8;q=0.9,*;q=0.1
Accept-Language: en
Connection: Keep-Alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Pragma: no-cache
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*


This produced the following truncated output (limited to 10 lines) :
------------------------------ snip ------------------------------
Date: Mon, 19 Feb 2024 01:09:00 GMT
Server: Apache/2.4.57 (Debian)
Location: http://172.20.0.2/lam/
Content-Length: 282
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1


------------------------------ snip ------------------------------

Security bug Report

Hi, there. I've been using LAM docker with version ldap-account-manager-8.5RC. I found a bug:
If the master password to lam is changed to something different from the default lam string, say 123, then after the container is restarted, this password is somehow reset to lam!
This seems a serious security issue if you expose lam to Internet. As a matter of fact, I am currently doing this.
Hope you guys notice this and fix it ASAP.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.