Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-9356

Опубликовано: 11 дек. 2014
Источник: redhat
CVSS2: 5.4
EPSS Низкий

Описание

Path traversal vulnerability in Docker before 1.3.3 allows remote attackers to write to arbitrary files and bypass a container protection mechanism via a full pathname in a symlink in an (1) image or (2) build in a Dockerfile.

It was found that a malicious container image could overwrite arbitrary portions of the host file system by including absolute symlinks, potentially leading to privilege escalation.

Отчет

  • This issue affects the versions of Docker as shipped with Red Hat Enterprise Linux 7. However, this flaw is not known to be exploitable under any supported scenario. A future update may address this issue.
  • Red Hat does not support or recommend running untrusted images.
  • In Red Hat OpenStack Platform, because the flaw's impact is low and docker is not directly used by the director-operator, no update will be provided at this time for the operator containers.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenStack Platform 16.2osp-director-provisioner-containerWill not fix
Red Hat OpenStack Platform 16.2rhosp-rhel8-tech-preview/osp-director-downloaderWill not fix
Red Hat OpenStack Platform 16.2rhosp-rhel8-tech-preview/osp-director-operatorWill not fix
Red Hat Enterprise Linux 7 ExtrasdockerFixedRHSA-2015:062305.03.2015

Показывать по

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=1172761docker: Path traversal during processing of absolute symlinks

EPSS

Процентиль: 78%
0.01209
Низкий

5.4 Medium

CVSS2

Связанные уязвимости

CVSS3: 8.6
ubuntu
больше 5 лет назад

Path traversal vulnerability in Docker before 1.3.3 allows remote attackers to write to arbitrary files and bypass a container protection mechanism via a full pathname in a symlink in an (1) image or (2) build in a Dockerfile.

CVSS3: 8.6
nvd
больше 5 лет назад

Path traversal vulnerability in Docker before 1.3.3 allows remote attackers to write to arbitrary files and bypass a container protection mechanism via a full pathname in a symlink in an (1) image or (2) build in a Dockerfile.

CVSS3: 8.6
msrc
почти 4 года назад

Описание отсутствует

CVSS3: 8.6
debian
больше 5 лет назад

Path traversal vulnerability in Docker before 1.3.3 allows remote atta ...

CVSS3: 5.9
github
около 4 лет назад

Path Traversal in Docker

EPSS

Процентиль: 78%
0.01209
Низкий

5.4 Medium

CVSS2