Логотип exploitDog
bind:CVE-2019-13139
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-13139

Количество 8

Количество 8

ubuntu логотип

CVE-2019-13139

больше 6 лет назад

In Docker before 18.09.4, an attacker who is capable of supplying or manipulating the build path for the "docker build" command would be able to gain command execution. An issue exists in the way "docker build" processes remote git URLs, and results in command injection into the underlying "git clone" command, leading to code execution in the context of the user executing the "docker build" command. This occurs because git ref can be misinterpreted as a flag.

CVSS3: 8.4
EPSS: Низкий
redhat логотип

CVE-2019-13139

почти 7 лет назад

In Docker before 18.09.4, an attacker who is capable of supplying or manipulating the build path for the "docker build" command would be able to gain command execution. An issue exists in the way "docker build" processes remote git URLs, and results in command injection into the underlying "git clone" command, leading to code execution in the context of the user executing the "docker build" command. This occurs because git ref can be misinterpreted as a flag.

CVSS3: 6.7
EPSS: Низкий
nvd логотип

CVE-2019-13139

больше 6 лет назад

In Docker before 18.09.4, an attacker who is capable of supplying or manipulating the build path for the "docker build" command would be able to gain command execution. An issue exists in the way "docker build" processes remote git URLs, and results in command injection into the underlying "git clone" command, leading to code execution in the context of the user executing the "docker build" command. This occurs because git ref can be misinterpreted as a flag.

CVSS3: 8.4
EPSS: Низкий
msrc логотип

CVE-2019-13139

больше 4 лет назад

CVSS3: 8.4
EPSS: Низкий
debian логотип

CVE-2019-13139

больше 6 лет назад

In Docker before 18.09.4, an attacker who is capable of supplying or m ...

CVSS3: 8.4
EPSS: Низкий
github логотип

GHSA-33j8-c2xf-8225

больше 3 лет назад

In Docker before 18.09.4, an attacker who is capable of supplying or manipulating the build path for the "docker build" command would be able to gain command execution. An issue exists in the way "docker build" processes remote git URLs, and results in command injection into the underlying "git clone" command, leading to code execution in the context of the user executing the "docker build" command. This occurs because git ref can be misinterpreted as a flag.

CVSS3: 8.4
EPSS: Низкий
fstec логотип

BDU:2019-03651

почти 7 лет назад

Уязвимость механизма docker build средства автоматизации развёртывания и управления приложениями в средах с поддержкой контейнеризации Docker, позволяющая нарушителю получить несанкционированный доступ к информации, вызвать отказ в обслуживании или оказать воздействие на доступность информации

CVSS3: 8.4
EPSS: Низкий
oracle-oval логотип

ELSA-2019-4813

больше 6 лет назад

ELSA-2019-4813: docker-engine security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2019-13139

In Docker before 18.09.4, an attacker who is capable of supplying or manipulating the build path for the "docker build" command would be able to gain command execution. An issue exists in the way "docker build" processes remote git URLs, and results in command injection into the underlying "git clone" command, leading to code execution in the context of the user executing the "docker build" command. This occurs because git ref can be misinterpreted as a flag.

CVSS3: 8.4
0%
Низкий
больше 6 лет назад
redhat логотип
CVE-2019-13139

In Docker before 18.09.4, an attacker who is capable of supplying or manipulating the build path for the "docker build" command would be able to gain command execution. An issue exists in the way "docker build" processes remote git URLs, and results in command injection into the underlying "git clone" command, leading to code execution in the context of the user executing the "docker build" command. This occurs because git ref can be misinterpreted as a flag.

CVSS3: 6.7
0%
Низкий
почти 7 лет назад
nvd логотип
CVE-2019-13139

In Docker before 18.09.4, an attacker who is capable of supplying or manipulating the build path for the "docker build" command would be able to gain command execution. An issue exists in the way "docker build" processes remote git URLs, and results in command injection into the underlying "git clone" command, leading to code execution in the context of the user executing the "docker build" command. This occurs because git ref can be misinterpreted as a flag.

CVSS3: 8.4
0%
Низкий
больше 6 лет назад
msrc логотип
CVSS3: 8.4
0%
Низкий
больше 4 лет назад
debian логотип
CVE-2019-13139

In Docker before 18.09.4, an attacker who is capable of supplying or m ...

CVSS3: 8.4
0%
Низкий
больше 6 лет назад
github логотип
GHSA-33j8-c2xf-8225

In Docker before 18.09.4, an attacker who is capable of supplying or manipulating the build path for the "docker build" command would be able to gain command execution. An issue exists in the way "docker build" processes remote git URLs, and results in command injection into the underlying "git clone" command, leading to code execution in the context of the user executing the "docker build" command. This occurs because git ref can be misinterpreted as a flag.

CVSS3: 8.4
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2019-03651

Уязвимость механизма docker build средства автоматизации развёртывания и управления приложениями в средах с поддержкой контейнеризации Docker, позволяющая нарушителю получить несанкционированный доступ к информации, вызвать отказ в обслуживании или оказать воздействие на доступность информации

CVSS3: 8.4
0%
Низкий
почти 7 лет назад
oracle-oval логотип
ELSA-2019-4813

ELSA-2019-4813: docker-engine security update (IMPORTANT)

больше 6 лет назад

Уязвимостей на страницу