First published: Thu Apr 27 2023(Updated: )
Docker Desktop for Windows before 4.6 allows attackers to overwrite any file through the windowscontainers/start dockerBackendV2 API by controlling the data-root field inside the DaemonJSON field in the WindowsContainerStartRequest class. This allows exploiting a symlink vulnerability in ..\dataRoot\network\files\local-kv.db because of a TOCTOU race condition.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Docker Desktop | <4.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Docker Desktop for Windows vulnerability is CVE-2022-38730.
CVE-2022-38730 has a severity rating of 6.3, which is classified as medium.
Attackers can exploit CVE-2022-38730 by controlling the data-root field inside the DaemonJSON field in the WindowsContainerStartRequest class, allowing them to overwrite any file through the windowscontainers/start dockerBackendV2 API.
Docker Desktop for Windows versions before 4.6.0 are affected by CVE-2022-38730.
Yes, you can find more information about CVE-2022-38730 in the Docker Desktop release notes (https://docs.docker.com/desktop/release-notes/#docker-desktop-460) and in the CyberArk threat research blog (https://www.cyberark.com/resources/threat-research-blog/breaking-docker-named-pipes-systematically-docker-desktop-privilege-escalation-part-2).