Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2014-8179

Опубликовано: 17 дек. 2019
Источник: nvd
CVSS3: 7.5
CVSS2: 5
EPSS Низкий

Описание

Docker Engine before 1.8.3 and CS Docker Engine before 1.6.2-CS7 does not properly validate and extract the manifest object from its JSON representation during a pull, which allows attackers to inject new attributes in a JSON object and bypass pull-by-digest validation.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:docker:cs_engine:*:*:*:*:*:*:*:*
Версия до 1.6.2-cs7 (исключая)
cpe:2.3:a:docker:docker:*:*:*:*:*:*:*:*
Версия до 1.8.3 (исключая)
Конфигурация 2
cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*

EPSS

Процентиль: 77%
0.01073
Низкий

7.5 High

CVSS3

5 Medium

CVSS2

Дефекты

CWE-20

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 5 лет назад

Docker Engine before 1.8.3 and CS Docker Engine before 1.6.2-CS7 does not properly validate and extract the manifest object from its JSON representation during a pull, which allows attackers to inject new attributes in a JSON object and bypass pull-by-digest validation.

redhat
больше 9 лет назад

Docker Engine before 1.8.3 and CS Docker Engine before 1.6.2-CS7 does not properly validate and extract the manifest object from its JSON representation during a pull, which allows attackers to inject new attributes in a JSON object and bypass pull-by-digest validation.

CVSS3: 7.5
msrc
почти 4 года назад

Описание отсутствует

CVSS3: 7.5
debian
больше 5 лет назад

Docker Engine before 1.8.3 and CS Docker Engine before 1.6.2-CS7 does ...

CVSS3: 7.5
github
около 3 лет назад

Docker Engine before 1.8.3 and CS Docker Engine before 1.6.2-CS7 does not properly validate and extract the manifest object from its JSON representation during a pull, which allows attackers to inject new attributes in a JSON object and bypass pull-by-digest validation.

EPSS

Процентиль: 77%
0.01073
Низкий

7.5 High

CVSS3

5 Medium

CVSS2

Дефекты

CWE-20