Логотип exploitDog
bind:"GHSA-742w-89gc-8m9c" OR bind:"CVE-2020-15157"
Консоль
Логотип exploitDog

exploitDog

bind:"GHSA-742w-89gc-8m9c" OR bind:"CVE-2020-15157"

Количество 12

Количество 12

github логотип

GHSA-742w-89gc-8m9c

почти 4 года назад

containerd v1.2.x can be coerced into leaking credentials during image pull

CVSS3: 6.1
EPSS: Низкий
ubuntu логотип

CVE-2020-15157

больше 5 лет назад

In containerd (an industry-standard container runtime) before version 1.2.14 there is a credential leaking vulnerability. If a container image manifest in the OCI Image format or Docker Image V2 Schema 2 format includes a URL for the location of a specific image layer (otherwise known as a “foreign layer”), the default containerd resolver will follow that URL to attempt to download it. In v1.2.x but not 1.3.0 or later, the default containerd resolver will provide its authentication credentials if the server where the URL is located presents an HTTP 401 status code along with registry-specific HTTP headers. If an attacker publishes a public image with a manifest that directs one of the layers to be fetched from a web server they control and they trick a user or system into pulling the image, they can obtain the credentials used for pulling that image. In some cases, this may be the user's username and password for the registry. In other cases, this may be the credentials attached...

CVSS3: 6.1
EPSS: Низкий
redhat логотип

CVE-2020-15157

больше 5 лет назад

In containerd (an industry-standard container runtime) before version 1.2.14 there is a credential leaking vulnerability. If a container image manifest in the OCI Image format or Docker Image V2 Schema 2 format includes a URL for the location of a specific image layer (otherwise known as a “foreign layer”), the default containerd resolver will follow that URL to attempt to download it. In v1.2.x but not 1.3.0 or later, the default containerd resolver will provide its authentication credentials if the server where the URL is located presents an HTTP 401 status code along with registry-specific HTTP headers. If an attacker publishes a public image with a manifest that directs one of the layers to be fetched from a web server they control and they trick a user or system into pulling the image, they can obtain the credentials used for pulling that image. In some cases, this may be the user's username and password for the registry. In other cases, this may be the credentials attached...

CVSS3: 6.1
EPSS: Низкий
nvd логотип

CVE-2020-15157

больше 5 лет назад

In containerd (an industry-standard container runtime) before version 1.2.14 there is a credential leaking vulnerability. If a container image manifest in the OCI Image format or Docker Image V2 Schema 2 format includes a URL for the location of a specific image layer (otherwise known as a “foreign layer”), the default containerd resolver will follow that URL to attempt to download it. In v1.2.x but not 1.3.0 or later, the default containerd resolver will provide its authentication credentials if the server where the URL is located presents an HTTP 401 status code along with registry-specific HTTP headers. If an attacker publishes a public image with a manifest that directs one of the layers to be fetched from a web server they control and they trick a user or system into pulling the image, they can obtain the credentials used for pulling that image. In some cases, this may be the user's username and password for the registry. In other cases, this may be the credentials attached to

CVSS3: 6.1
EPSS: Низкий
debian логотип

CVE-2020-15157

больше 5 лет назад

In containerd (an industry-standard container runtime) before version ...

CVSS3: 6.1
EPSS: Низкий
oracle-oval логотип

ELSA-2020-5906

больше 5 лет назад

ELSA-2020-5906: containerd security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2020-5900

больше 5 лет назад

ELSA-2020-5900: docker-engine docker-cli security update (IMPORTANT)

EPSS: Низкий
fstec логотип

BDU:2021-01894

больше 5 лет назад

Уязвимость среды выполнения контейнеров Containerd, связанная с недостатком механизма хранения регистрационных данных, позволяющая нарушителю получить доступ несанкционированный доступ к защищаемой информации

CVSS3: 6.1
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:0445-1

почти 5 лет назад

Security update for containerd, docker, docker-runc, golang-github-docker-libnetwork

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:3312-1

больше 3 лет назад

Security update for libcontainers-common

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2022:23018-1

почти 4 года назад

Security update for conmon, libcontainers-common, libseccomp, podman

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:23018-1

почти 4 года назад

Security update for conmon, libcontainers-common, libseccomp, podman

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-742w-89gc-8m9c

containerd v1.2.x can be coerced into leaking credentials during image pull

CVSS3: 6.1
1%
Низкий
почти 4 года назад
ubuntu логотип
CVE-2020-15157

In containerd (an industry-standard container runtime) before version 1.2.14 there is a credential leaking vulnerability. If a container image manifest in the OCI Image format or Docker Image V2 Schema 2 format includes a URL for the location of a specific image layer (otherwise known as a “foreign layer”), the default containerd resolver will follow that URL to attempt to download it. In v1.2.x but not 1.3.0 or later, the default containerd resolver will provide its authentication credentials if the server where the URL is located presents an HTTP 401 status code along with registry-specific HTTP headers. If an attacker publishes a public image with a manifest that directs one of the layers to be fetched from a web server they control and they trick a user or system into pulling the image, they can obtain the credentials used for pulling that image. In some cases, this may be the user's username and password for the registry. In other cases, this may be the credentials attached...

CVSS3: 6.1
1%
Низкий
больше 5 лет назад
redhat логотип
CVE-2020-15157

In containerd (an industry-standard container runtime) before version 1.2.14 there is a credential leaking vulnerability. If a container image manifest in the OCI Image format or Docker Image V2 Schema 2 format includes a URL for the location of a specific image layer (otherwise known as a “foreign layer”), the default containerd resolver will follow that URL to attempt to download it. In v1.2.x but not 1.3.0 or later, the default containerd resolver will provide its authentication credentials if the server where the URL is located presents an HTTP 401 status code along with registry-specific HTTP headers. If an attacker publishes a public image with a manifest that directs one of the layers to be fetched from a web server they control and they trick a user or system into pulling the image, they can obtain the credentials used for pulling that image. In some cases, this may be the user's username and password for the registry. In other cases, this may be the credentials attached...

CVSS3: 6.1
1%
Низкий
больше 5 лет назад
nvd логотип
CVE-2020-15157

In containerd (an industry-standard container runtime) before version 1.2.14 there is a credential leaking vulnerability. If a container image manifest in the OCI Image format or Docker Image V2 Schema 2 format includes a URL for the location of a specific image layer (otherwise known as a “foreign layer”), the default containerd resolver will follow that URL to attempt to download it. In v1.2.x but not 1.3.0 or later, the default containerd resolver will provide its authentication credentials if the server where the URL is located presents an HTTP 401 status code along with registry-specific HTTP headers. If an attacker publishes a public image with a manifest that directs one of the layers to be fetched from a web server they control and they trick a user or system into pulling the image, they can obtain the credentials used for pulling that image. In some cases, this may be the user's username and password for the registry. In other cases, this may be the credentials attached to

CVSS3: 6.1
1%
Низкий
больше 5 лет назад
debian логотип
CVE-2020-15157

In containerd (an industry-standard container runtime) before version ...

CVSS3: 6.1
1%
Низкий
больше 5 лет назад
oracle-oval логотип
ELSA-2020-5906

ELSA-2020-5906: containerd security update (IMPORTANT)

больше 5 лет назад
oracle-oval логотип
ELSA-2020-5900

ELSA-2020-5900: docker-engine docker-cli security update (IMPORTANT)

больше 5 лет назад
fstec логотип
BDU:2021-01894

Уязвимость среды выполнения контейнеров Containerd, связанная с недостатком механизма хранения регистрационных данных, позволяющая нарушителю получить доступ несанкционированный доступ к защищаемой информации

CVSS3: 6.1
1%
Низкий
больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2021:0445-1

Security update for containerd, docker, docker-runc, golang-github-docker-libnetwork

почти 5 лет назад
suse-cvrf логотип
SUSE-SU-2022:3312-1

Security update for libcontainers-common

больше 3 лет назад
suse-cvrf логотип
openSUSE-SU-2022:23018-1

Security update for conmon, libcontainers-common, libseccomp, podman

почти 4 года назад
suse-cvrf логотип
SUSE-SU-2022:23018-1

Security update for conmon, libcontainers-common, libseccomp, podman

почти 4 года назад

Уязвимостей на страницу