Overview
- Description
- Docker Desktop for Windows before 4.6 allows attackers to overwrite any file through the windowscontainers/start dockerBackendV2 API by controlling the data-root field inside the DaemonJSON field in the WindowsContainerStartRequest class. This allows exploiting a symlink vulnerability in ..\dataRoot\network\files\local-kv.db because of a TOCTOU race condition.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 6.3
- Impact score
- 5.2
- Exploitability score
- 1
- Vector string
- CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
- Severity
- MEDIUM
Weaknesses
- nvd@nist.gov
- CWE-367
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:docker:desktop:*:*:*:*:windows:*:*:*", "vulnerable": true, "matchCriteriaId": "D0374A4A-5949-461F-B1B5-C8A46DFD3FC8", "versionEndExcluding": "4.6.0" } ], "operator": "OR" } ] } ]