In Docker before 18.09.4, an attacker who is capable of supplying or manipulating the build path for the "docker build" command would be able to gain command execution. An issue exists in the way "docker build" processes remote git URLs, and results in command injection into the underlying "git clone" command, leading to code execution in the context of the user executing the "docker build" command. This occurs because git ref can be misinterpreted as a flag.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2019-08-22T19:47:43
Updated: 2024-08-04T23:41:10.517Z
Reserved: 2019-07-01T00:00:00
Link: CVE-2019-13139
Vulnrichment
No data.
NVD
Status : Modified
Published: 2019-08-22T20:15:12.003
Modified: 2020-08-24T17:37:01.140
Link: CVE-2019-13139
Redhat