CVE-2019-13139

high

Description

In Docker before 18.09.4, an attacker who is capable of supplying or manipulating the build path for the "docker build" command would be able to gain command execution. An issue exists in the way "docker build" processes remote git URLs, and results in command injection into the underlying "git clone" command, leading to code execution in the context of the user executing the "docker build" command. This occurs because git ref can be misinterpreted as a flag.

References

https://www.debian.org/security/2019/dsa-4521

https://security.netapp.com/advisory/ntap-20190910-0001/

https://seclists.org/bugtraq/2019/Sep/21

https://github.com/moby/moby/pull/38944

https://docs.docker.com/engine/release-notes/#18094

https://access.redhat.com/errata/RHBA-2019:3092

Details

Source: Mitre, NVD

Published: 2019-08-22

Updated: 2020-08-24

Risk Information

CVSS v2

Base Score: 4.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P

Severity: Medium

CVSS v3

Base Score: 8.4

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: High