ID |
CVE-2022-38730
|
Sažetak |
Docker Desktop for Windows before 4.6 allows attackers to overwrite any file through the windowscontainers/start dockerBackendV2 API by controlling the data-root field inside the DaemonJSON field in the WindowsContainerStartRequest class. This allows exploiting a symlink vulnerability in ..\dataRoot\network\files\local-kv.db because of a TOCTOU race condition. |
Reference |
|
CVSS |
Base: | 6.3 |
Impact: | 5.2 |
Exploitability: | 1.0 |
|
Pristup |
Vektor | Složenost | Autentikacija |
LOCAL |
HIGH |
LOW |
|
Impact |
Povjerljivost | Cjelovitost | Dostupnost |
NONE |
HIGH |
HIGH |
|
CVSS vektor |
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H |
Zadnje važnije ažuriranje |
31-01-2025 - 20:15 |
Objavljeno |
27-04-2023 - 20:15 |