In Docker Desktop 4.17.x the Artifactory Integration falls back to sending registry credentials over plain HTTP if the HTTPS health check has failed. A targeted network sniffing attack can lead to a disclosure of sensitive information. Only users who have Access Experimental Features enabled and have logged in to a private registry are affected.
References
Link | Resource |
---|---|
https://docs.docker.com/desktop/release-notes/#4180 | Release Notes |
https://github.com/docker/for-win/issues/13344 | Exploit |
https://docs.docker.com/desktop/release-notes/#4180 | Release Notes |
https://github.com/docker/for-win/issues/13344 | Exploit |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:39
Type | Values Removed | Values Added |
---|---|---|
References | () https://docs.docker.com/desktop/release-notes/#4180 - Release Notes | |
References | () https://github.com/docker/for-win/issues/13344 - Exploit | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.9 |
07 Nov 2023, 04:04
Type | Values Removed | Values Added |
---|---|---|
Summary | In Docker Desktop 4.17.x the Artifactory Integration falls back to sending registry credentials over plain HTTP if the HTTPS health check has failed. A targeted network sniffing attack can lead to a disclosure of sensitive information. Only users who have Access Experimental Features enabled and have logged in to a private registry are affected. |
Information
Published : 2023-04-06 09:15
Updated : 2024-11-21 07:39
NVD link : CVE-2023-1802
Mitre link : CVE-2023-1802
CVE.ORG link : CVE-2023-1802
JSON object : View
Products Affected
docker
- desktop
CWE
CWE-319
Cleartext Transmission of Sensitive Information