First published: Tue Oct 31 2017(Updated: )
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Joyent Smart Data Center prior to agentsshar@1.0.0-release-20160901-20160901T051624Z-g3fd5adf (e469cf49-4de3-4658-8419-ab42837916ad). An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the docker API. The process does not properly validate user-supplied data which can allow for the upload of arbitrary files. An attacker can leverage this vulnerability to execute arbitrary code under the context of root. Was ZDI-CAN-3853.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Joyent Triton Datacenter |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-10940 is a vulnerability that allows remote attackers to execute arbitrary code on vulnerable installations of Joyent Smart Data Center.
CVE-2017-10940 has a severity rating of 8.8 (critical).
The affected software is Joyent Triton Datacenter.
The vulnerability can be exploited by remote attackers who have the ability to execute low-privilege code.
Yes, you can find more information about CVE-2017-10940 at the following references: [1] http://www.securityfocus.com/bid/99510 [2] https://help.joyent.com/hc/en-us/articles/115009649927-Security-Advisory-ZDI-CAN-3853-Docker-File-Overwrite-Vulnerability [3] https://zerodayinitiative.com/advisories/ZDI-17-453