A flaw was discovered in the API endpoint behind the "docker cp" command. The endpoint is vulnerable to a Time Of Check to Time Of Use (TOCTOU) vulnerability in the way it handles symbolic links inside a container. An attacker who has compromised an existing container can cause arbitrary files on the host filesystem to be read/written when an administrator tries to copy a file from/to the container.
Platform | Package | Release Date | Advisory |
---|---|---|---|
Amazon Linux 1 | docker | 2019-07-17 23:53 | ALAS-2019-1245 |
Amazon Linux 2 - Docker Extra | docker | 2021-10-19 19:11 | ALAS2DOCKER-2021-004 |
Amazon Linux 2 - Aws-nitro-enclaves-cli Extra | docker | 2021-10-19 19:11 | ALAS2NITRO-ENCLAVES-2021-004 |
Score Type | Score | Vector | |
---|---|---|---|
Amazon Linux | CVSSv2 | 6.2 | AV:L/AC:H/Au:N/C:C/I:C/A:C |
Amazon Linux | CVSSv3 | 7.5 | CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H |
NVD | CVSSv2 | 6.2 | AV:L/AC:H/Au:N/C:C/I:C/A:C |
NVD | CVSSv3 | 7.5 | CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H |