First published: Thu Aug 22 2019(Updated: )
In Docker before 18.09.4, an attacker who is capable of supplying or manipulating the build path for the "docker build" command would be able to gain command execution. An issue exists in the way "docker build" processes remote git URLs, and results in command injection into the underlying "git clone" command, leading to code execution in the context of the user executing the "docker build" command. This occurs because git ref can be misinterpreted as a flag.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Docker Docker | <18.09.4 | |
debian/docker.io | 18.09.1+dfsg1-7.1+deb10u3 20.10.5+dfsg1-1+deb11u2 20.10.24+dfsg1-1 20.10.25+dfsg1-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-13139 is a vulnerability in Docker before version 18.09.4 that allows an attacker to gain command execution by manipulating the build path for the "docker build" command.
The severity of CVE-2019-13139 is high with a CVSS score of 8.4.
CVE-2019-13139 affects Docker versions before 18.09.4 and can be exploited by supplying or manipulating the build path for the "docker build" command.
An attacker can exploit CVE-2019-13139 by manipulating the build path for the "docker build" command, allowing them to gain command execution.
To fix CVE-2019-13139, update Docker to version 18.09.4 or higher.