First published: Thu May 23 2019(Updated: )
In Docker through 18.06.1-ce-rc2, the API endpoints behind the 'docker cp' command are vulnerable to a symlink-exchange attack with Directory Traversal, giving attackers arbitrary read-write access to the host filesystem with root privileges, because daemon/archive.go does not do archive operations on a frozen filesystem (or from within a chroot).
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Docker Docker | =17.06.0-ce | |
Docker Docker | =17.06.0-ce-rc1 | |
Docker Docker | =17.06.0-ce-rc2 | |
Docker Docker | =17.06.0-ce-rc3 | |
Docker Docker | =17.06.0-ce-rc4 | |
Docker Docker | =17.06.0-ce-rc5 | |
Docker Docker | =17.06.1-ce | |
Docker Docker | =17.06.1-ce-rc1 | |
Docker Docker | =17.06.1-ce-rc2 | |
Docker Docker | =17.06.1-ce-rc3 | |
Docker Docker | =17.06.1-ce-rc4 | |
Docker Docker | =17.06.2-ce | |
Docker Docker | =17.06.2-ce-rc1 | |
Docker Docker | =17.07.0-ce | |
Docker Docker | =17.07.0-ce-rc1 | |
Docker Docker | =17.07.0-ce-rc2 | |
Docker Docker | =17.07.0-ce-rc3 | |
Docker Docker | =17.07.0-ce-rc4 | |
Docker Docker | =17.09.0-ce | |
Docker Docker | =17.09.0-ce-rc1 | |
Docker Docker | =17.09.0-ce-rc2 | |
Docker Docker | =17.09.0-ce-rc3 | |
Docker Docker | =17.09.1-ce | |
Docker Docker | =17.09.1-ce--rc1 | |
Docker Docker | =17.10.0-ce | |
Docker Docker | =17.10.0-ce-rc1 | |
Docker Docker | =17.10.0-ce-rc2 | |
Docker Docker | =17.11.0-ce | |
Docker Docker | =17.11.0-ce-rc1 | |
Docker Docker | =17.11.0-ce-rc2 | |
Docker Docker | =17.11.0-ce-rc3 | |
Docker Docker | =17.11.0-ce-rc4 | |
Docker Docker | =17.12.0-ce | |
Docker Docker | =17.12.0-ce-rc1 | |
Docker Docker | =17.12.0-ce-rc2 | |
Docker Docker | =17.12.0-ce-rc3 | |
Docker Docker | =17.12.0-ce-rc4 | |
Docker Docker | =17.12.1-ce | |
Docker Docker | =17.12.1-ce-rc1 | |
Docker Docker | =17.12.1-ce-rc2 | |
Docker Docker | =18.01.0-ce | |
Docker Docker | =18.01.0-ce-rc1 | |
Docker Docker | =18.02.0-ce | |
Docker Docker | =18.02.0-ce-rc1 | |
Docker Docker | =18.02.0-ce-rc2 | |
Docker Docker | =18.03.0-ce | |
Docker Docker | =18.03.0-ce-rc1 | |
Docker Docker | =18.03.0-ce-rc2 | |
Docker Docker | =18.03.0-ce-rc3 | |
Docker Docker | =18.03.0-ce-rc4 | |
Docker Docker | =18.03.1-ce | |
Docker Docker | =18.03.1-ce-rc1 | |
Docker Docker | =18.03.1-ce-rc2 | |
Docker Docker | =18.04.0-ce | |
Docker Docker | =18.04.0-ce-rc1 | |
Docker Docker | =18.04.0-ce-rc2 | |
Docker Docker | =18.05.0-ce | |
Docker Docker | =18.05.0-ce-rc1 | |
Docker Docker | =18.06.0-ce | |
Docker Docker | =18.06.0-ce-rc1 | |
Docker Docker | =18.06.0-ce-rc2 | |
Docker Docker | =18.06.0-ce-rc3 | |
Docker Docker | =18.06.1-ce-rc1 | |
Docker Docker | =18.06.1-ce-rc2 | |
debian/docker.io | 20.10.5+dfsg1-1+deb11u2 20.10.24+dfsg1-1 26.1.5+dfsg1-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.