Описание
In Docker through 18.06.1-ce-rc2, the API endpoints behind the 'docker cp' command are vulnerable to a symlink-exchange attack with Directory Traversal, giving attackers arbitrary read-write access to the host filesystem with root privileges, because daemon/archive.go does not do archive operations on a frozen filesystem (or from within a chroot).
Релиз | Статус | Примечание |
---|---|---|
bionic | released | 18.09.7-0ubuntu1~18.04.3 |
cosmic | released | 18.09.7-0ubuntu1~18.10.3 |
devel | not-affected | 18.09.7-0ubuntu1 |
disco | released | 18.09.7-0ubuntu1~19.04.4 |
esm-apps/bionic | released | 18.09.7-0ubuntu1~18.04.3 |
esm-infra-legacy/trusty | DNE | |
esm-infra/xenial | released | 18.09.7-0ubuntu1~16.04.4 |
precise/esm | DNE | |
trusty | ignored | end of standard support |
trusty/esm | DNE |
Показывать по
EPSS
6.2 Medium
CVSS2
7.5 High
CVSS3
Связанные уязвимости
In Docker through 18.06.1-ce-rc2, the API endpoints behind the 'docker cp' command are vulnerable to a symlink-exchange attack with Directory Traversal, giving attackers arbitrary read-write access to the host filesystem with root privileges, because daemon/archive.go does not do archive operations on a frozen filesystem (or from within a chroot).
In Docker through 18.06.1-ce-rc2, the API endpoints behind the 'docker cp' command are vulnerable to a symlink-exchange attack with Directory Traversal, giving attackers arbitrary read-write access to the host filesystem with root privileges, because daemon/archive.go does not do archive operations on a frozen filesystem (or from within a chroot).
In Docker through 18.06.1-ce-rc2, the API endpoints behind the 'docker ...
EPSS
6.2 Medium
CVSS2
7.5 High
CVSS3