CVE-2018-15664
Public on 2019-05-23
Modified on 2021-12-09
Description
A flaw was discovered in the API endpoint behind the "docker cp" command. The endpoint is vulnerable to a Time Of Check to Time Of Use (TOCTOU) vulnerability in the way it handles symbolic links inside a container. An attacker who has compromised an existing container can cause arbitrary files on the host filesystem to be read/written when an administrator tries to copy a file from/to the container.
Severity
CVSS v3 Base Score
See breakdown
Affected Packages
Platform | Package | Release Date | Advisory | Status |
---|---|---|---|---|
Amazon Linux 1 | docker | 2019-07-17 | ALAS-2019-1245 | Fixed |
Amazon Linux 2 - Docker Extra | docker | 2021-10-19 | ALAS2DOCKER-2021-004 | Fixed |
Amazon Linux 2 - Aws-nitro-enclaves-cli Extra | docker | 2021-10-19 | ALAS2NITRO-ENCLAVES-2021-004 | Fixed |
CVSS Scores
Score Type | Score | Vector | |
---|---|---|---|
Amazon Linux | CVSSv2 | 6.2 | AV:L/AC:H/Au:N/C:C/I:C/A:C |
Amazon Linux | CVSSv3 | 7.5 | CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H |
NVD | CVSSv2 | 6.2 | AV:L/AC:H/Au:N/C:C/I:C/A:C |
NVD | CVSSv3 | 7.5 | CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H |