Docker before 1.3 does not properly validate image IDs, which allows remote attackers to redirect to another image through the loading of untrusted images via 'docker load'.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1168436 | Issue Tracking Third Party Advisory |
https://groups.google.com/forum/#%21msg/docker-announce/aQoVmQlcE0A/smPuBNYf8VwJ | |
https://bugzilla.redhat.com/show_bug.cgi?id=1168436 | Issue Tracking Third Party Advisory |
https://groups.google.com/forum/#%21msg/docker-announce/aQoVmQlcE0A/smPuBNYf8VwJ |
Configurations
History
21 Nov 2024, 02:11
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1168436 - Issue Tracking, Third Party Advisory | |
References | () https://groups.google.com/forum/#%21msg/docker-announce/aQoVmQlcE0A/smPuBNYf8VwJ - |
07 Nov 2023, 02:20
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2018-02-06 16:29
Updated : 2024-11-21 02:11
NVD link : CVE-2014-5282
Mitre link : CVE-2014-5282
CVE.ORG link : CVE-2014-5282
JSON object : View
Products Affected
docker
- docker
CWE
CWE-20
Improper Input Validation