CVE-2019-13139
Public on 2019-08-22
Modified on 2021-12-02
Description
A command injection flaw was discovered in Docker during the `docker build` command. By providing a specially crafted path argument for the container to build, it is possible to inject command options to the `git fetch`/`git checkout` commands that are executed by Docker and to execute code with the privileges of the user running Docker. A local attacker who can run `docker build` with a controlled build path, or a remote attacker who has control over the docker build path, could elevate their privileges or execute code.
Severity
CVSS v3 Base Score
See breakdown
Affected Packages
Platform | Package | Release Date | Advisory | Status |
---|---|---|---|---|
Amazon Linux 1 | docker | 2019-11-04 | ALAS-2019-1316 | Fixed |
Amazon Linux 2 - Docker Extra | docker | 2021-10-22 | ALAS2DOCKER-2021-003 | Fixed |
Amazon Linux 2 - Aws-nitro-enclaves-cli Extra | docker | 2021-10-22 | ALAS2NITRO-ENCLAVES-2021-003 | Fixed |
CVSS Scores
Score Type | Score | Vector | |
---|---|---|---|
Amazon Linux | CVSSv3 | 6.7 | CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
NVD | CVSSv2 | 4.6 | AV:L/AC:L/Au:N/C:P/I:P/A:P |
NVD | CVSSv3 | 8.4 | CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |