Risk Analysis and Prevention of Unauthorized Access to Docker API and SpringBoot Actuator

JIA Mei-juan ZHU Qing JIANG Shan ZHANG Li-hua ZHANG Bai-shun

Computer & Telecommunication ›› 2024, Vol. 1 ›› Issue (6) : 22.

Computer & Telecommunication ›› 2024, Vol. 1 ›› Issue (6) : 22. DOI: 10.15966/j.cnki.dnydx.2024.06.012

Risk Analysis and Prevention of Unauthorized Access to Docker API and SpringBoot Actuator

Author information +
History +

Abstract

With the popularization of cloud computing technology and the development of containerization technology, Docker and SpringBoot have become indispensable tools for modern software development and deployment. However, this widespread use also comes with security risks. This article provides an in-depth analysis of the unauthorized access risks of Docker API and SpringBoot Actor. When these critical components are exposed to unauthorized access, attackers may exploit these vulnerabilities to perform malicious operations, such as deploying malicious containers, tampering with application con?gurations, or stealing sensitive information. These behaviors may not only lead to service interruption and data leakage, but also cause serious reputation and ?nancial losses to the enterprise. 

Key words

Docker API / SpringBoot Actuator / unauthorized access vulnerability / risk analysis and prevention 

Cite this article

Download Citations
JIA Mei-juan ZHU Qing JIANG Shan ZHANG Li-hua ZHANG Bai-shun. Risk Analysis and Prevention of Unauthorized Access to Docker API and SpringBoot Actuator[J]. Computer & Telecommunication. 2024, 1(6): 22 https://doi.org/10.15966/j.cnki.dnydx.2024.06.012

Accesses

Citation

Detail

Sections
Recommended

/