Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2019-13139

Опубликовано: 22 авг. 2019
Источник: ubuntu
Приоритет: untriaged
EPSS Низкий
CVSS2: 4.6
CVSS3: 8.4

Описание

In Docker before 18.09.4, an attacker who is capable of supplying or manipulating the build path for the "docker build" command would be able to gain command execution. An issue exists in the way "docker build" processes remote git URLs, and results in command injection into the underlying "git clone" command, leading to code execution in the context of the user executing the "docker build" command. This occurs because git ref can be misinterpreted as a flag.

РелизСтатусПримечание
bionic

not-affected

18.09.7
devel

not-affected

18.09.7
disco

not-affected

18.09.7
esm-apps/bionic

not-affected

18.09.7
esm-infra-legacy/trusty

DNE

esm-infra/xenial

not-affected

18.09.7
precise/esm

DNE

trusty

ignored

end of standard support
trusty/esm

DNE

upstream

released

18.09.4

Показывать по

EPSS

Процентиль: 62%
0.00435
Низкий

4.6 Medium

CVSS2

8.4 High

CVSS3

Связанные уязвимости

CVSS3: 6.7
redhat
больше 6 лет назад

In Docker before 18.09.4, an attacker who is capable of supplying or manipulating the build path for the "docker build" command would be able to gain command execution. An issue exists in the way "docker build" processes remote git URLs, and results in command injection into the underlying "git clone" command, leading to code execution in the context of the user executing the "docker build" command. This occurs because git ref can be misinterpreted as a flag.

CVSS3: 8.4
nvd
около 6 лет назад

In Docker before 18.09.4, an attacker who is capable of supplying or manipulating the build path for the "docker build" command would be able to gain command execution. An issue exists in the way "docker build" processes remote git URLs, and results in command injection into the underlying "git clone" command, leading to code execution in the context of the user executing the "docker build" command. This occurs because git ref can be misinterpreted as a flag.

CVSS3: 8.4
msrc
около 4 лет назад

Описание отсутствует

CVSS3: 8.4
debian
около 6 лет назад

In Docker before 18.09.4, an attacker who is capable of supplying or m ...

CVSS3: 8.4
github
больше 3 лет назад

In Docker before 18.09.4, an attacker who is capable of supplying or manipulating the build path for the "docker build" command would be able to gain command execution. An issue exists in the way "docker build" processes remote git URLs, and results in command injection into the underlying "git clone" command, leading to code execution in the context of the user executing the "docker build" command. This occurs because git ref can be misinterpreted as a flag.

EPSS

Процентиль: 62%
0.00435
Низкий

4.6 Medium

CVSS2

8.4 High

CVSS3