Skip to content

Information Disclosure: AWS Docker Config Exposure

Identifier: aws_docker_config_exposure

Scanner(s) Support

GraphQL Scanner REST Scanner WebApp Scanner ASM Scanner

Description

When AWS Docker configuration files aren't properly secured, they can be accessible to anyone online, potentially revealing sensitive settings like credentials, endpoints, or service details that could allow attackers to compromise Docker containers or AWS resources.

How we test: We scan for exposed AWS Docker configuration files such as Dockerrun.aws.json and analyze responses to detect if sensitive configuration details, credentials, or service information are accessible via web servers.

Configuration

Example

Example configuration:

---
security_tests:
  aws_docker_config_exposure:
    skip: false

Reference

skip

Type : boolean

Skip the test if true.