A command injection flaw was discovered in Docker during the `docker build` command. By providing a specially crafted path argument for the container to build, it is possible to inject command options to the `git fetch`/`git checkout` commands that are executed by Docker and to execute code with the privileges of the user running Docker. A local attacker who can run `docker build` with a controlled build path, or a remote attacker who has control over the docker build path, could elevate their privileges or execute code.
Platform | Package | Release Date | Advisory |
---|---|---|---|
Amazon Linux 1 | docker | 2019-11-04 18:12 | ALAS-2019-1316 |
Amazon Linux 2 - Docker Extra | docker | 2021-10-22 22:40 | ALAS2DOCKER-2021-003 |
Amazon Linux 2 - Aws-nitro-enclaves-cli Extra | docker | 2021-10-22 22:38 | ALAS2NITRO-ENCLAVES-2021-003 |
Score Type | Score | Vector | |
---|---|---|---|
Amazon Linux | CVSSv3 | 6.7 | CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
NVD | CVSSv2 | 4.6 | AV:L/AC:L/Au:N/C:P/I:P/A:P |
NVD | CVSSv3 | 8.4 | CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |