First published: Thu May 23 2019(Updated: )
In Docker through 18.06.1-ce-rc2, the API endpoints behind the 'docker cp' command are vulnerable to a symlink-exchange attack with Directory Traversal, giving attackers arbitrary read-write access to the host filesystem with root privileges, because daemon/archive.go does not do archive operations on a frozen filesystem (or from within a chroot).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/docker.io | 20.10.5+dfsg1-1+deb11u2 20.10.5+dfsg1-1+deb11u3 20.10.24+dfsg1-1+deb12u1 26.1.5+dfsg1-4 | |
Docker | =17.06.0-ce | |
Docker | =17.06.0-ce-rc1 | |
Docker | =17.06.0-ce-rc2 | |
Docker | =17.06.0-ce-rc3 | |
Docker | =17.06.0-ce-rc4 | |
Docker | =17.06.0-ce-rc5 | |
Docker | =17.06.1-ce | |
Docker | =17.06.1-ce-rc1 | |
Docker | =17.06.1-ce-rc2 | |
Docker | =17.06.1-ce-rc3 | |
Docker | =17.06.1-ce-rc4 | |
Docker | =17.06.2-ce | |
Docker | =17.06.2-ce-rc1 | |
Docker | =17.07.0-ce | |
Docker | =17.07.0-ce-rc1 | |
Docker | =17.07.0-ce-rc2 | |
Docker | =17.07.0-ce-rc3 | |
Docker | =17.07.0-ce-rc4 | |
Docker | =17.09.0-ce | |
Docker | =17.09.0-ce-rc1 | |
Docker | =17.09.0-ce-rc2 | |
Docker | =17.09.0-ce-rc3 | |
Docker | =17.09.1-ce | |
Docker | =17.09.1-ce--rc1 | |
Docker | =17.10.0-ce | |
Docker | =17.10.0-ce-rc1 | |
Docker | =17.10.0-ce-rc2 | |
Docker | =17.11.0-ce | |
Docker | =17.11.0-ce-rc1 | |
Docker | =17.11.0-ce-rc2 | |
Docker | =17.11.0-ce-rc3 | |
Docker | =17.11.0-ce-rc4 | |
Docker | =17.12.0-ce | |
Docker | =17.12.0-ce-rc1 | |
Docker | =17.12.0-ce-rc2 | |
Docker | =17.12.0-ce-rc3 | |
Docker | =17.12.0-ce-rc4 | |
Docker | =17.12.1-ce | |
Docker | =17.12.1-ce-rc1 | |
Docker | =17.12.1-ce-rc2 | |
Docker | =18.01.0-ce | |
Docker | =18.01.0-ce-rc1 | |
Docker | =18.02.0-ce | |
Docker | =18.02.0-ce-rc1 | |
Docker | =18.02.0-ce-rc2 | |
Docker | =18.03.0-ce | |
Docker | =18.03.0-ce-rc1 | |
Docker | =18.03.0-ce-rc2 | |
Docker | =18.03.0-ce-rc3 | |
Docker | =18.03.0-ce-rc4 | |
Docker | =18.03.1-ce | |
Docker | =18.03.1-ce-rc1 | |
Docker | =18.03.1-ce-rc2 | |
Docker | =18.04.0-ce | |
Docker | =18.04.0-ce-rc1 | |
Docker | =18.04.0-ce-rc2 | |
Docker | =18.05.0-ce | |
Docker | =18.05.0-ce-rc1 | |
Docker | =18.06.0-ce | |
Docker | =18.06.0-ce-rc1 | |
Docker | =18.06.0-ce-rc2 | |
Docker | =18.06.0-ce-rc3 | |
Docker | =18.06.1-ce-rc1 | |
Docker | =18.06.1-ce-rc2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-15664 is considered critical as it allows arbitrary read-write access to the host filesystem with root privileges.
To fix CVE-2018-15664, update Docker to versions 20.10.5+dfsg1-1+deb11u2 or later, or apply applicable patches.
CVE-2018-15664 affects Docker versions prior to 20.10.5, including various releases from 17.06.0-ce up to 18.06.1-ce.
CVE-2018-15664 exploits a symlink-exchange vulnerability along with directory traversal attacks.
Exploitation of CVE-2018-15664 can result in unauthorized access to sensitive files and potential system compromise due to root-level access.