First published: Tue May 28 2019(Updated: )
In Docker through 18.06.1-ce-rc2, the API endpoints behind the 'docker cp' command are vulnerable to a symlink-exchange attack with Directory Traversal, giving attackers arbitrary read-write access to the host filesystem with root privileges, because daemon/archive.go does not do archive operations on a frozen filesystem (or from within a chroot). References: <a href="https://seclists.org/oss-sec/2019/q2/131">https://seclists.org/oss-sec/2019/q2/131</a> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1096726">https://bugzilla.suse.com/show_bug.cgi?id=1096726</a> <a href="https://bugzilla.novell.com/show_bug.cgi?id=1096726">https://bugzilla.novell.com/show_bug.cgi?id=1096726</a> Upstream Patch: <a href="https://github.com/docker/docker/pull/39252">https://github.com/docker/docker/pull/39252</a> <a href="https://github.com/docker/docker/pull/5720">https://github.com/docker/docker/pull/5720</a> <a href="https://github.com/docker/docker/pull/6000">https://github.com/docker/docker/pull/6000</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Python Docker | <=18.06.1-ce-rc2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1714722 is critical due to its potential for arbitrary read-write access to the host filesystem with root privileges.
To fix REDHAT-BUG-1714722, upgrade Docker to a version later than 18.06.1-ce-rc2 where the vulnerability is patched.
The systems affected by REDHAT-BUG-1714722 include Docker versions up to and including 18.06.1-ce-rc2.
REDHAT-BUG-1714722 involves a symlink-exchange attack coupled with directory traversal.
The implications of REDHAT-BUG-1714722 include serious security risks as attackers can gain unauthorized access and control over the host filesystem.