Lucene search

K
githubGitHub Advisory DatabaseGHSA-5QGP-P5JC-W2RM
HistoryFeb 15, 2022 - 12:41 a.m.

Arbitrary Code Execution in Docker

2022-02-1500:41:12
CWE-59
GitHub Advisory Database
github.com
22

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.09 Low

EPSS

Percentile

94.6%

Docker before 1.3.2 allows remote attackers to write to arbitrary files and execute arbitrary code via a (1) symlink or (2) hard link attack in an image archive in a (a) pull or (b) load operation.

Affected configurations

Vulners
Node
github.com\/docker\/dockerceRange<1.3.2
CPENameOperatorVersion
github.com/docker/dockerlt1.3.2

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.09 Low

EPSS

Percentile

94.6%