Arbitrary Code Execution in Docker
High severity
GitHub Reviewed
Published
Feb 15, 2022
to the GitHub Advisory Database
•
Updated Jan 9, 2023
Description
Reviewed
May 20, 2021
Published to the GitHub Advisory Database
Feb 15, 2022
Last updated
Jan 9, 2023
Docker before 1.3.2 allows remote attackers to write to arbitrary files and execute arbitrary code via a (1) symlink or (2) hard link attack in an image archive in a (a) pull or (b) load operation.
References