Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-13139

Опубликовано: 22 авг. 2019
Источник: debian
EPSS Низкий

Описание

In Docker before 18.09.4, an attacker who is capable of supplying or manipulating the build path for the "docker build" command would be able to gain command execution. An issue exists in the way "docker build" processes remote git URLs, and results in command injection into the underlying "git clone" command, leading to code execution in the context of the user executing the "docker build" command. This occurs because git ref can be misinterpreted as a flag.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
docker.iofixed18.09.5+dfsg1-1experimentalpackage
docker.iofixed18.09.1+dfsg1-8package

Примечания

  • https://github.com/moby/moby/pull/38944

  • https://staaldraad.github.io/post/2019-07-16-cve-2019-13139-docker-build/

EPSS

Процентиль: 62%
0.00435
Низкий

Связанные уязвимости

CVSS3: 8.4
ubuntu
около 6 лет назад

In Docker before 18.09.4, an attacker who is capable of supplying or manipulating the build path for the "docker build" command would be able to gain command execution. An issue exists in the way "docker build" processes remote git URLs, and results in command injection into the underlying "git clone" command, leading to code execution in the context of the user executing the "docker build" command. This occurs because git ref can be misinterpreted as a flag.

CVSS3: 6.7
redhat
больше 6 лет назад

In Docker before 18.09.4, an attacker who is capable of supplying or manipulating the build path for the "docker build" command would be able to gain command execution. An issue exists in the way "docker build" processes remote git URLs, and results in command injection into the underlying "git clone" command, leading to code execution in the context of the user executing the "docker build" command. This occurs because git ref can be misinterpreted as a flag.

CVSS3: 8.4
nvd
около 6 лет назад

In Docker before 18.09.4, an attacker who is capable of supplying or manipulating the build path for the "docker build" command would be able to gain command execution. An issue exists in the way "docker build" processes remote git URLs, and results in command injection into the underlying "git clone" command, leading to code execution in the context of the user executing the "docker build" command. This occurs because git ref can be misinterpreted as a flag.

CVSS3: 8.4
msrc
около 4 лет назад

Описание отсутствует

CVSS3: 8.4
github
больше 3 лет назад

In Docker before 18.09.4, an attacker who is capable of supplying or manipulating the build path for the "docker build" command would be able to gain command execution. An issue exists in the way "docker build" processes remote git URLs, and results in command injection into the underlying "git clone" command, leading to code execution in the context of the user executing the "docker build" command. This occurs because git ref can be misinterpreted as a flag.

EPSS

Процентиль: 62%
0.00435
Низкий