Skip to content

donutt2u/docker-vulnerability-assessment

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

6 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

Docker Container Vulnerability Assessment

πŸ“Œ Project Overview

This project demonstrates a comprehensive vulnerability assessment of a Dockerized Damn Vulnerable Web Application (DVWA) using Kali Linux and Trivy scanner.

πŸ“‚ Structure

  • Docker/: Docker Compose configuration.
  • Remediation/: Hardening recommendations.
  • Report/: Final vulnerability assessment report.
  • Scans/: Screenshots of Trivy scan and CVE findings.
  • Scripts/: PowerShell automation scripts.
  • dvwa_scan_report.txt: Raw Trivy output.

πŸ›‘οΈ Tools Used

  • Trivy (by Aqua Security)
  • Docker 26.1.5
  • Kali Linux 2025.2

πŸ“ˆ Key Findings

  • 1,575 vulnerabilities (256 Critical)
  • End-of-life base image (Debian 9.5)
  • Multiple Apache CVEs (e.g., CVE-2021-40438)

πŸ“œ Standards Referenced

  • OWASP Docker Top 10
  • NIST SP 800-190
  • ISO/IEC 27001:2013 A.12.6.1
  • CIS Docker Benchmark

πŸ”’ Recommendations

  • Use minimal secure base images
  • Apply regular CVE patching
  • Employ secrets management

πŸ”— References

About

CVE scanning and vulnerability remediation of containerized web apps using Docker and Trivy.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors