Docker prior to 1.3.3 does not properly validate image IDs, which allows remote malicious users to conduct path traversal attacks and spoof repositories via a crafted image in a (1) "docker load" operation or (2) "registry communications."
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
docker docker |