Skip to content

x/vulndb: potential Go vuln in github.com/moby/moby: CVE-2019-13139 #2236

Closed
@tatianab

Description

@tatianab

CVE-2019-13139 references github.com/moby/moby, which may be a Go module.

Description:
In Docker before 18.09.4, an attacker who is capable of supplying or manipulating the build path for the "docker build" command would be able to gain command execution. An issue exists in the way "docker build" processes remote git URLs, and results in command injection into the underlying "git clone" command, leading to code execution in the context of the user executing the "docker build" command. This occurs because git ref can be misinterpreted as a flag.

References:

Cross references:

See doc/triage.md for instructions on how to triage this report.

modules:
    - module: github.com/moby/moby
      vulnerable_at: 24.0.7+incompatible
      packages:
        - package: n/a
cves:
    - CVE-2019-13139
references:
    - fix: https://github.com/moby/moby/pull/38944
    - web: https://docs.docker.com/engine/release-notes/#18094
    - web: https://staaldraad.github.io/post/2019-07-16-cve-2019-13139-docker-build/
    - web: https://www.debian.org/security/2019/dsa-4521
    - web: https://security.netapp.com/advisory/ntap-20190910-0001/
    - web: https://seclists.org/bugtraq/2019/Sep/21
    - web: https://access.redhat.com/errata/RHBA-2019:3092

Metadata

Metadata

Assignees

No one assigned

    Labels

    excluded: LEGACY_FALSE_POSITIVE(DO NOT USE) Vulnerability marked as false positive before we introduced the triage process

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions