Логотип exploitDog
bind:"CVE-2019-13139"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2019-13139"

Количество 8

Количество 8

ubuntu логотип

CVE-2019-13139

около 6 лет назад

In Docker before 18.09.4, an attacker who is capable of supplying or manipulating the build path for the "docker build" command would be able to gain command execution. An issue exists in the way "docker build" processes remote git URLs, and results in command injection into the underlying "git clone" command, leading to code execution in the context of the user executing the "docker build" command. This occurs because git ref can be misinterpreted as a flag.

CVSS3: 8.4
EPSS: Низкий
redhat логотип

CVE-2019-13139

больше 6 лет назад

In Docker before 18.09.4, an attacker who is capable of supplying or manipulating the build path for the "docker build" command would be able to gain command execution. An issue exists in the way "docker build" processes remote git URLs, and results in command injection into the underlying "git clone" command, leading to code execution in the context of the user executing the "docker build" command. This occurs because git ref can be misinterpreted as a flag.

CVSS3: 6.7
EPSS: Низкий
nvd логотип

CVE-2019-13139

около 6 лет назад

In Docker before 18.09.4, an attacker who is capable of supplying or manipulating the build path for the "docker build" command would be able to gain command execution. An issue exists in the way "docker build" processes remote git URLs, and results in command injection into the underlying "git clone" command, leading to code execution in the context of the user executing the "docker build" command. This occurs because git ref can be misinterpreted as a flag.

CVSS3: 8.4
EPSS: Низкий
msrc логотип

CVE-2019-13139

около 4 лет назад

CVSS3: 8.4
EPSS: Низкий
debian логотип

CVE-2019-13139

около 6 лет назад

In Docker before 18.09.4, an attacker who is capable of supplying or m ...

CVSS3: 8.4
EPSS: Низкий
github логотип

GHSA-33j8-c2xf-8225

больше 3 лет назад

In Docker before 18.09.4, an attacker who is capable of supplying or manipulating the build path for the "docker build" command would be able to gain command execution. An issue exists in the way "docker build" processes remote git URLs, and results in command injection into the underlying "git clone" command, leading to code execution in the context of the user executing the "docker build" command. This occurs because git ref can be misinterpreted as a flag.

CVSS3: 8.4
EPSS: Низкий
fstec логотип

BDU:2019-03651

больше 6 лет назад

Уязвимость механизма docker build средства автоматизации развёртывания и управления приложениями в средах с поддержкой контейнеризации Docker, позволяющая нарушителю получить несанкционированный доступ к информации, вызвать отказ в обслуживании или оказать воздействие на доступность информации

CVSS3: 8.4
EPSS: Низкий
oracle-oval логотип

ELSA-2019-4813

почти 6 лет назад

ELSA-2019-4813: docker-engine security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2019-13139

In Docker before 18.09.4, an attacker who is capable of supplying or manipulating the build path for the "docker build" command would be able to gain command execution. An issue exists in the way "docker build" processes remote git URLs, and results in command injection into the underlying "git clone" command, leading to code execution in the context of the user executing the "docker build" command. This occurs because git ref can be misinterpreted as a flag.

CVSS3: 8.4
0%
Низкий
около 6 лет назад
redhat логотип
CVE-2019-13139

In Docker before 18.09.4, an attacker who is capable of supplying or manipulating the build path for the "docker build" command would be able to gain command execution. An issue exists in the way "docker build" processes remote git URLs, and results in command injection into the underlying "git clone" command, leading to code execution in the context of the user executing the "docker build" command. This occurs because git ref can be misinterpreted as a flag.

CVSS3: 6.7
0%
Низкий
больше 6 лет назад
nvd логотип
CVE-2019-13139

In Docker before 18.09.4, an attacker who is capable of supplying or manipulating the build path for the "docker build" command would be able to gain command execution. An issue exists in the way "docker build" processes remote git URLs, and results in command injection into the underlying "git clone" command, leading to code execution in the context of the user executing the "docker build" command. This occurs because git ref can be misinterpreted as a flag.

CVSS3: 8.4
0%
Низкий
около 6 лет назад
msrc логотип
CVSS3: 8.4
0%
Низкий
около 4 лет назад
debian логотип
CVE-2019-13139

In Docker before 18.09.4, an attacker who is capable of supplying or m ...

CVSS3: 8.4
0%
Низкий
около 6 лет назад
github логотип
GHSA-33j8-c2xf-8225

In Docker before 18.09.4, an attacker who is capable of supplying or manipulating the build path for the "docker build" command would be able to gain command execution. An issue exists in the way "docker build" processes remote git URLs, and results in command injection into the underlying "git clone" command, leading to code execution in the context of the user executing the "docker build" command. This occurs because git ref can be misinterpreted as a flag.

CVSS3: 8.4
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2019-03651

Уязвимость механизма docker build средства автоматизации развёртывания и управления приложениями в средах с поддержкой контейнеризации Docker, позволяющая нарушителю получить несанкционированный доступ к информации, вызвать отказ в обслуживании или оказать воздействие на доступность информации

CVSS3: 8.4
0%
Низкий
больше 6 лет назад
oracle-oval логотип
ELSA-2019-4813

ELSA-2019-4813: docker-engine security update (IMPORTANT)

почти 6 лет назад

Уязвимостей на страницу