Описание
Docker Desktop for Windows before 4.6.0 allows attackers to delete (or create) any file through the dockerBackendV2 windowscontainers/start API by controlling the pidfile field inside the DaemonJSON field in the WindowsContainerStartRequest class. This can indirectly lead to privilege escalation.
Ссылки
- Release Notes
- Third Party Advisory
- Release Notes
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 4.6.0 (исключая)
cpe:2.3:a:docker:desktop:*:*:*:*:windows:*:*:*
EPSS
Процентиль: 12%
0.0004
Низкий
7.8 High
CVSS3
Дефекты
NVD-CWE-noinfo
CWE-863
Связанные уязвимости
CVSS3: 7.8
github
почти 3 года назад
Docker Desktop for Windows before 4.6.0 allows attackers to delete (or create) any file through the dockerBackendV2 windowscontainers/start API by controlling the pidfile field inside the DaemonJSON field in the WindowsContainerStartRequest class. This can indirectly lead to privilege escalation.
EPSS
Процентиль: 12%
0.0004
Низкий
7.8 High
CVSS3
Дефекты
NVD-CWE-noinfo
CWE-863