6.4
CVSSv2

CVE-2014-9358

Published: 16/12/2014 Updated: 07/11/2023
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
VMScore: 570
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N

Vulnerability Summary

Docker prior to 1.3.3 does not properly validate image IDs, which allows remote malicious users to conduct path traversal attacks and spoof repositories via a crafted image in a (1) "docker load" operation or (2) "registry communications."

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

docker docker

Vendor Advisories

Debian Bug report logs - #772909 dockerio: CVE-2014-9356 CVE-2014-9357 CVE-2014-9358 Package: src:dockerio; Maintainer for src:dockerio is Dmitry Smirnov <onlyjob@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 12 Dec 2014 05:45:02 UTC Severity: grave Tags: fixed-upstream, security, u ...
Path traversal attacks are possible in the processing of absolute symlinks In checking symlinks for traversals, only relative links were considered This allowed path traversals to exist where they should have otherwise been prevented This was exploitable via both archive extraction and through volume mounts This vulnerability allowed malicious ...
Docker before 133 does not properly validate image IDs, which allows remote attackers to conduct path traversal attacks and spoof repositories via a crafted image in a (1) "docker load" operation or (2) "registry communications" ...