Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2019-13139

Опубликовано: 22 авг. 2019
Источник: nvd
CVSS3: 8.4
CVSS2: 4.6
EPSS Низкий

Описание

In Docker before 18.09.4, an attacker who is capable of supplying or manipulating the build path for the "docker build" command would be able to gain command execution. An issue exists in the way "docker build" processes remote git URLs, and results in command injection into the underlying "git clone" command, leading to code execution in the context of the user executing the "docker build" command. This occurs because git ref can be misinterpreted as a flag.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:docker:docker:*:*:*:*:enterprise:*:*:*
Версия до 18.09.4 (исключая)

EPSS

Процентиль: 62%
0.00435
Низкий

8.4 High

CVSS3

4.6 Medium

CVSS2

Дефекты

CWE-78

Связанные уязвимости

CVSS3: 8.4
ubuntu
около 6 лет назад

In Docker before 18.09.4, an attacker who is capable of supplying or manipulating the build path for the "docker build" command would be able to gain command execution. An issue exists in the way "docker build" processes remote git URLs, and results in command injection into the underlying "git clone" command, leading to code execution in the context of the user executing the "docker build" command. This occurs because git ref can be misinterpreted as a flag.

CVSS3: 6.7
redhat
больше 6 лет назад

In Docker before 18.09.4, an attacker who is capable of supplying or manipulating the build path for the "docker build" command would be able to gain command execution. An issue exists in the way "docker build" processes remote git URLs, and results in command injection into the underlying "git clone" command, leading to code execution in the context of the user executing the "docker build" command. This occurs because git ref can be misinterpreted as a flag.

CVSS3: 8.4
msrc
около 4 лет назад

Описание отсутствует

CVSS3: 8.4
debian
около 6 лет назад

In Docker before 18.09.4, an attacker who is capable of supplying or m ...

CVSS3: 8.4
github
больше 3 лет назад

In Docker before 18.09.4, an attacker who is capable of supplying or manipulating the build path for the "docker build" command would be able to gain command execution. An issue exists in the way "docker build" processes remote git URLs, and results in command injection into the underlying "git clone" command, leading to code execution in the context of the user executing the "docker build" command. This occurs because git ref can be misinterpreted as a flag.

EPSS

Процентиль: 62%
0.00435
Низкий

8.4 High

CVSS3

4.6 Medium

CVSS2

Дефекты

CWE-78