Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-15157

Опубликовано: 16 окт. 2020
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 2.6
CVSS3: 6.1

Описание

In containerd (an industry-standard container runtime) before version 1.2.14 there is a credential leaking vulnerability. If a container image manifest in the OCI Image format or Docker Image V2 Schema 2 format includes a URL for the location of a specific image layer (otherwise known as a “foreign layer”), the default containerd resolver will follow that URL to attempt to download it. In v1.2.x but not 1.3.0 or later, the default containerd resolver will provide its authentication credentials if the server where the URL is located presents an HTTP 401 status code along with registry-specific HTTP headers. If an attacker publishes a public image with a manifest that directs one of the layers to be fetched from a web server they control and they trick a user or system into pulling the image, they can obtain the credentials used for pulling that image. In some cases, this may be the user's username and password for the registry. In other cases, this may be the credentials attached...

РелизСтатусПримечание
bionic

not-affected

v1.2 only
devel

not-affected

v1.2 only
esm-apps/bionic

not-affected

v1.2 only
esm-apps/xenial

released

1.2.6-0ubuntu1~16.04.4
esm-infra-legacy/trusty

DNE

esm-infra/focal

not-affected

v1.2 only
focal

not-affected

v1.2 only
precise/esm

DNE

trusty

ignored

end of standard support
trusty/esm

DNE

Показывать по

РелизСтатусПримечание
bionic

released

19.03.6-0ubuntu1~18.04.2
devel

released

19.03.13-0ubuntu3
esm-apps/bionic

released

19.03.6-0ubuntu1~18.04.2
esm-apps/focal

released

19.03.8-0ubuntu1.20.04.1
esm-infra-legacy/trusty

DNE

esm-infra/xenial

released

18.09.7-0ubuntu1~16.04.6
focal

released

19.03.8-0ubuntu1.20.04.1
precise/esm

DNE

trusty

ignored

end of standard support
trusty/esm

DNE

Показывать по

EPSS

Процентиль: 80%
0.0137
Низкий

2.6 Low

CVSS2

6.1 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.1
redhat
больше 5 лет назад

In containerd (an industry-standard container runtime) before version 1.2.14 there is a credential leaking vulnerability. If a container image manifest in the OCI Image format or Docker Image V2 Schema 2 format includes a URL for the location of a specific image layer (otherwise known as a “foreign layer”), the default containerd resolver will follow that URL to attempt to download it. In v1.2.x but not 1.3.0 or later, the default containerd resolver will provide its authentication credentials if the server where the URL is located presents an HTTP 401 status code along with registry-specific HTTP headers. If an attacker publishes a public image with a manifest that directs one of the layers to be fetched from a web server they control and they trick a user or system into pulling the image, they can obtain the credentials used for pulling that image. In some cases, this may be the user's username and password for the registry. In other cases, this may be the credentials attached...

CVSS3: 6.1
nvd
больше 5 лет назад

In containerd (an industry-standard container runtime) before version 1.2.14 there is a credential leaking vulnerability. If a container image manifest in the OCI Image format or Docker Image V2 Schema 2 format includes a URL for the location of a specific image layer (otherwise known as a “foreign layer”), the default containerd resolver will follow that URL to attempt to download it. In v1.2.x but not 1.3.0 or later, the default containerd resolver will provide its authentication credentials if the server where the URL is located presents an HTTP 401 status code along with registry-specific HTTP headers. If an attacker publishes a public image with a manifest that directs one of the layers to be fetched from a web server they control and they trick a user or system into pulling the image, they can obtain the credentials used for pulling that image. In some cases, this may be the user's username and password for the registry. In other cases, this may be the credentials attached to

CVSS3: 6.1
debian
больше 5 лет назад

In containerd (an industry-standard container runtime) before version ...

CVSS3: 6.1
github
почти 4 года назад

containerd v1.2.x can be coerced into leaking credentials during image pull

oracle-oval
больше 5 лет назад

ELSA-2020-5906: containerd security update (IMPORTANT)

EPSS

Процентиль: 80%
0.0137
Низкий

2.6 Low

CVSS2

6.1 Medium

CVSS3