Docker before 1.3.2 allows remote attackers to write to arbitrary files and execute arbitrary code via a (1) symlink or (2) hard link attack in an image archive in a (a) pull or (b) load operation.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Docker | Docker | * | 1.3.1 (including) |
Docker | Docker | 1.0.0 (including) | 1.0.0 (including) |
Docker | Docker | 1.3.0 (including) | 1.3.0 (including) |
Red Hat Enterprise Linux 7 Extras | RedHat | docker-0:1.3.2-4.el7 | * |
Docker.io | Ubuntu | upstream | * |
Docker.io | Ubuntu | utopic | * |