7.5
CVSSv2

CVE-2019-14271

Published: 29/07/2019 Updated: 18/04/2022
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 670
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

In Docker 19.03.x prior to 19.03.1 linked against the GNU C Library (aka glibc), code injection can occur when the nsswitch facility dynamically loads a library inside a chroot that contains the contents of the container.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

docker docker

debian debian linux 10.0

opensuse leap 15.0

opensuse leap 15.1

Vendor Advisories

Three security vulnerabilities have been discovered in the Docker container runtime: Insecure loading of NSS libraries in docker cp could result in execution of code with root privileges, sensitive data could be logged in debug mode and there was a command injection vulnerability in the docker build command For the stable distribution (buster), th ...

Github Repositories

Docker Security Checklist For a more thorough checklist please refer to the latest Docker CIS benchmark Patching Ensure you patch your Docker daemon/containerd etc to protect against escape CVEs such as CVE-2019-5736 CVE-2019-14271 CVE-2020–15257 Follow appropriate Docker security updates Image security Conduct image vulnerability scanning using an appropriate scann

A convenient and time-saving auto script of building environment and exploit it.

CVE-2019-14271_Exploit A convenient and time-saving auto script of building environment and exploit it References githubcom/Metarget/metarget githubcom/Metarget/metarget/tree/master/writeups_cnv/docker-cve-2019-14271 githubcom/thomasyang1207/Exploits/tree/master/CVE_2019_14271 Usage chmod 777 Exploitsh chmod 777 Install_envsh sudo /Install_envsh

Tool to test if you're in a Docker container and attempt simple breakouts

Docker Escape Tool Work In Progress This tool will help identify if you're in a Docker container and try some quick escape techniques to help assess the security of your containers This tool is focused specifically on Docker escapes though some of the logic may apply to other container runtimes I intend to follow this up with a blog post on helping secure your Docker co

Docker Escape Tool Work In Progress This tool will help identify if you're in a Docker container and try some quick escape techniques to help assess the security of your containers This tool is focused specifically on Docker escapes though some of the logic may apply to other container runtimes I intend to follow this up with a blog post on helping secure your Docker co

Slides, Cheatsheet and Resources from our Blackhat EU talk

'Reverse Engineering and Exploiting Builds in the Cloud' Conference Material Repository This repository contains material and slides for the talk Reverse Engineering and Exploiting Builds in the Cloud: cheatsheetmd contains multiple commands, Dockerfiles, YML configs that can assist you in your build environment reversing slidespdf are the presentation slides Rec

IS-21 Full Stack Developer Coding Assignment

Sreyas_Naaraayanan-Ramanathan-ecc-dssb-IS21-code-challenge-req101408 IS-21 Full Stack Developer Coding Assignment [The web application is developed as part of the IS-21 Full Stack Developer Position] Introduction This is a Web Application that tracks and manages Web Applications developed by the Province of BC The front-end component is built using the NextJS framework and the

云原生(容器云)安全测试镜像

Cloud-Native-Security-Test 容器云测试镜像制作,文章链接 镜像准备 下载构建环境(我已经打包到github) mkdir -p /root/docker/ cd /root/docker/ git clone githubcom/ShadowFl0w/Cloud-Native-Security-Testgit 准备其他工具 cd /root/docker/Cloud-Native-Security-Test #下载Tomcat wget archiv

Docker Security Checklist For a more thorough checklist please refer to the latest Docker CIS benchmark Patching Ensure you patch your Docker daemon/containerd etc to protect against escape CVEs such as CVE-2019-5736 CVE-2019-14271 CVE-2020–15257 Follow appropriate Docker security updates Image security Conduct image vulnerability scanning using an appropriate scann