Lucene search

K
githubGitHub Advisory DatabaseGHSA-QMMC-JPPF-32WV
HistoryFeb 15, 2022 - 12:41 a.m.

Directory Traversal in Docker

2022-02-1500:41:14
CWE-59
GitHub Advisory Database
github.com
39

6.4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

0.003 Low

EPSS

Percentile

68.2%

Docker before 1.3.3 does not properly validate image IDs, which allows remote attackers to conduct path traversal attacks and spoof repositories via a crafted image in a (1) “docker load” operation or (2) “registry communications.”

Affected configurations

Vulners
Node
github.com\/docker\/dockerceRange<1.3.2
CPENameOperatorVersion
github.com/docker/dockerlt1.3.2

6.4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

0.003 Low

EPSS

Percentile

68.2%