CVE-2021-34079

OS Command injection vulnerability in Mintzo Docker-Tester through 1.2.1 allows attackers to execute arbitrary commands via shell metacharacters in the 'ports' entry of a crafted docker-compose.yml file.
References
Link Resource
https://advisory.checkmarx.net/advisory/CX-2021-4786 Exploit Third Party Advisory
https://www.npmjs.com/package/docker-tester Product Third Party Advisory
https://advisory.checkmarx.net/advisory/CX-2021-4786 Exploit Third Party Advisory
https://www.npmjs.com/package/docker-tester Product Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:docker-tester_project:docker-tester:*:*:*:*:*:node.js:*:*

History

21 Nov 2024, 06:09

Type Values Removed Values Added
References () https://advisory.checkmarx.net/advisory/CX-2021-4786 - Exploit, Third Party Advisory () https://advisory.checkmarx.net/advisory/CX-2021-4786 - Exploit, Third Party Advisory
References () https://www.npmjs.com/package/docker-tester - Product, Third Party Advisory () https://www.npmjs.com/package/docker-tester - Product, Third Party Advisory

Information

Published : 2022-06-02 14:15

Updated : 2024-11-21 06:09


NVD link : CVE-2021-34079

Mitre link : CVE-2021-34079

CVE.ORG link : CVE-2021-34079


JSON object : View

Products Affected

docker-tester_project

  • docker-tester
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')