Directory Traversal in Docker
Moderate severity
GitHub Reviewed
Published
Feb 15, 2022
to the GitHub Advisory Database
•
Updated Jan 9, 2023
Description
Reviewed
May 20, 2021
Published to the GitHub Advisory Database
Feb 15, 2022
Last updated
Jan 9, 2023
Docker before 1.3.3 does not properly validate image IDs, which allows remote attackers to conduct path traversal attacks and spoof repositories via a crafted image in a (1) "docker load" operation or (2) "registry communications."
References