cve-2024-41110
Vulnerability from cvelistv5
Published
2024-07-24 16:49
Modified
2024-10-13 21:03
Severity ?
EPSS score ?
Summary
Moby authz zero length regression
References
Impacted products
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:docker:moby:19.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "moby", "vendor": "docker", "versions": [ { "lessThanOrEqual": "19.03.15", "status": "affected", "version": "19.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:docker:moby:20.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "moby", "vendor": "docker", "versions": [ { "lessThanOrEqual": "20.10.27", "status": "affected", "version": "20.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:docker:moby:23.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "moby", "vendor": "docker", "versions": [ { "lessThanOrEqual": "23.0.14", "status": "affected", "version": "23.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:docker:moby:24.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "moby", "vendor": "docker", "versions": [ { "lessThanOrEqual": "24.0.9", "status": "affected", "version": "24.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:docker:moby:25.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "moby", "vendor": "docker", "versions": [ { "lessThanOrEqual": "25.0.5", "status": "affected", "version": "25.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:docker:moby:26.1.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "moby", "vendor": "docker", "versions": [ { "lessThanOrEqual": "26.0.2", "status": "affected", "version": "26.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:docker:moby:27.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "moby", "vendor": "docker", "versions": [ { "lessThanOrEqual": "26.1.14", "status": "affected", "version": "26.1.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:docker:moby:27.1.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "moby", "vendor": "docker", "versions": [ { "status": "affected", "version": "27.1.0" } ] }, { "cpes": [ "cpe:2.3:a:docker:moby:26.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "moby", "vendor": "docker", "versions": [ { "lessThanOrEqual": "26.0.2", "status": "affected", "version": "26.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:docker:moby:26.1.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "moby", "vendor": "docker", "versions": [ { "lessThanOrEqual": "26.1.14", "status": "affected", "version": "26.1.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:docker:moby:27.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "moby", "vendor": "docker", "versions": [ { "lessThanOrEqual": "27.0.3", "status": "affected", "version": "27.0.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-41110", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-26T03:55:30.375492Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-29T21:01:46.898Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-10-13T21:03:34.392Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/moby/moby/security/advisories/GHSA-v23v-6jw2-98fq", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/moby/moby/security/advisories/GHSA-v23v-6jw2-98fq" }, { "name": "https://github.com/moby/moby/commit/411e817ddf710ff8e08fa193da80cb78af708191", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/moby/moby/commit/411e817ddf710ff8e08fa193da80cb78af708191" }, { "name": "https://github.com/moby/moby/commit/42f40b1d6dd7562342f832b9cd2adf9e668eeb76", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/moby/moby/commit/42f40b1d6dd7562342f832b9cd2adf9e668eeb76" }, { "name": "https://github.com/moby/moby/commit/65cc597cea28cdc25bea3b8a86384b4251872919", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/moby/moby/commit/65cc597cea28cdc25bea3b8a86384b4251872919" }, { "name": "https://github.com/moby/moby/commit/852759a7df454cbf88db4e954c919becd48faa9b", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/moby/moby/commit/852759a7df454cbf88db4e954c919becd48faa9b" }, { "name": "https://github.com/moby/moby/commit/a31260625655cff9ae226b51757915e275e304b0", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/moby/moby/commit/a31260625655cff9ae226b51757915e275e304b0" }, { "name": "https://github.com/moby/moby/commit/a79fabbfe84117696a19671f4aa88b82d0f64fc1", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/moby/moby/commit/a79fabbfe84117696a19671f4aa88b82d0f64fc1" }, { "name": "https://github.com/moby/moby/commit/ae160b4edddb72ef4bd71f66b975a1a1cc434f00", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/moby/moby/commit/ae160b4edddb72ef4bd71f66b975a1a1cc434f00" }, { "name": "https://github.com/moby/moby/commit/ae2b3666c517c96cbc2adf1af5591a6b00d4ec0f", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/moby/moby/commit/ae2b3666c517c96cbc2adf1af5591a6b00d4ec0f" }, { "name": "https://github.com/moby/moby/commit/cc13f952511154a2866bddbb7dddebfe9e83b801", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/moby/moby/commit/cc13f952511154a2866bddbb7dddebfe9e83b801" }, { "name": "https://github.com/moby/moby/commit/fc274cd2ff4cf3b48c91697fb327dd1fb95588fb", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/moby/moby/commit/fc274cd2ff4cf3b48c91697fb327dd1fb95588fb" }, { "name": "https://www.docker.com/blog/docker-security-advisory-docker-engine-authz-plugin", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.docker.com/blog/docker-security-advisory-docker-engine-authz-plugin" }, { "url": "https://security.netapp.com/advisory/ntap-20240802-0001/" }, { "url": "https://lists.debian.org/debian-lts-announce/2024/10/msg00009.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "moby", "vendor": "moby", "versions": [ { "status": "affected", "version": "\u003e= 19.03.0, \u003c= 19.03.15" }, { "status": "affected", "version": "\u003e= 20.0.0, \u003c= 20.10.27" }, { "status": "affected", "version": "\u003e= 23.0.0, \u003c= 23.0.14" }, { "status": "affected", "version": "\u003e= 24.0.0, \u003c= 24.0.9" }, { "status": "affected", "version": "\u003e= 25.0.0, \u003c= 25.0.5" }, { "status": "affected", "version": "\u003e= 26.0.0, \u003c= 26.0.2" }, { "status": "affected", "version": "\u003e= 26.1.0, \u003c= 26.1.14" }, { "status": "affected", "version": "\u003e= 27.0.0, \u003c= 27.0.3" }, { "status": "affected", "version": "= 27.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Moby is an open-source project created by Docker for software containerization. A security vulnerability has been detected in certain versions of Docker Engine, which could allow an attacker to bypass authorization plugins (AuthZ) under specific circumstances. The base likelihood of this being exploited is low.\n\nUsing a specially-crafted API request, an Engine API client could make the daemon forward the request or response to an authorization plugin without the body. In certain circumstances, the authorization plugin may allow a request which it would have otherwise denied if the body had been forwarded to it.\n\nA security issue was discovered In 2018, where an attacker could bypass AuthZ plugins using a specially crafted API request. This could lead to unauthorized actions, including privilege escalation. Although this issue was fixed in Docker Engine v18.09.1 in January 2019, the fix was not carried forward to later major versions, resulting in a regression. Anyone who depends on authorization plugins that introspect the request and/or response body to make access control decisions is potentially impacted.\n\nDocker EE v19.03.x and all versions of Mirantis Container Runtime are not vulnerable.\n\ndocker-ce v27.1.1 containes patches to fix the vulnerability. Patches have also been merged into the master, 19.03, 20.0, 23.0, 24.0, 25.0, 26.0, and 26.1 release branches. If one is unable to upgrade immediately, avoid using AuthZ plugins and/or restrict access to the Docker API to trusted parties, following the principle of least privilege." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-187", "description": "CWE-187: Partial String Comparison", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-444", "description": "CWE-444: Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863: Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-30T19:09:22.764Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/moby/moby/security/advisories/GHSA-v23v-6jw2-98fq", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/moby/moby/security/advisories/GHSA-v23v-6jw2-98fq" }, { "name": "https://github.com/moby/moby/commit/411e817ddf710ff8e08fa193da80cb78af708191", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/moby/moby/commit/411e817ddf710ff8e08fa193da80cb78af708191" }, { "name": "https://github.com/moby/moby/commit/42f40b1d6dd7562342f832b9cd2adf9e668eeb76", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/moby/moby/commit/42f40b1d6dd7562342f832b9cd2adf9e668eeb76" }, { "name": "https://github.com/moby/moby/commit/65cc597cea28cdc25bea3b8a86384b4251872919", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/moby/moby/commit/65cc597cea28cdc25bea3b8a86384b4251872919" }, { "name": "https://github.com/moby/moby/commit/852759a7df454cbf88db4e954c919becd48faa9b", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/moby/moby/commit/852759a7df454cbf88db4e954c919becd48faa9b" }, { "name": "https://github.com/moby/moby/commit/a31260625655cff9ae226b51757915e275e304b0", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/moby/moby/commit/a31260625655cff9ae226b51757915e275e304b0" }, { "name": "https://github.com/moby/moby/commit/a79fabbfe84117696a19671f4aa88b82d0f64fc1", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/moby/moby/commit/a79fabbfe84117696a19671f4aa88b82d0f64fc1" }, { "name": "https://github.com/moby/moby/commit/ae160b4edddb72ef4bd71f66b975a1a1cc434f00", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/moby/moby/commit/ae160b4edddb72ef4bd71f66b975a1a1cc434f00" }, { "name": "https://github.com/moby/moby/commit/ae2b3666c517c96cbc2adf1af5591a6b00d4ec0f", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/moby/moby/commit/ae2b3666c517c96cbc2adf1af5591a6b00d4ec0f" }, { "name": "https://github.com/moby/moby/commit/cc13f952511154a2866bddbb7dddebfe9e83b801", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/moby/moby/commit/cc13f952511154a2866bddbb7dddebfe9e83b801" }, { "name": "https://github.com/moby/moby/commit/fc274cd2ff4cf3b48c91697fb327dd1fb95588fb", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/moby/moby/commit/fc274cd2ff4cf3b48c91697fb327dd1fb95588fb" }, { "name": "https://www.docker.com/blog/docker-security-advisory-docker-engine-authz-plugin", "tags": [ "x_refsource_MISC" ], "url": "https://www.docker.com/blog/docker-security-advisory-docker-engine-authz-plugin" } ], "source": { "advisory": "GHSA-v23v-6jw2-98fq", "discovery": "UNKNOWN" }, "title": "Moby authz zero length regression" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-41110", "datePublished": "2024-07-24T16:49:53.068Z", "dateReserved": "2024-07-15T15:53:28.321Z", "dateUpdated": "2024-10-13T21:03:34.392Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-41110\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2024-07-24T17:15:11.053\",\"lastModified\":\"2024-11-21T09:32:15.160\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Moby is an open-source project created by Docker for software containerization. A security vulnerability has been detected in certain versions of Docker Engine, which could allow an attacker to bypass authorization plugins (AuthZ) under specific circumstances. The base likelihood of this being exploited is low.\\n\\nUsing a specially-crafted API request, an Engine API client could make the daemon forward the request or response to an authorization plugin without the body. In certain circumstances, the authorization plugin may allow a request which it would have otherwise denied if the body had been forwarded to it.\\n\\nA security issue was discovered In 2018, where an attacker could bypass AuthZ plugins using a specially crafted API request. This could lead to unauthorized actions, including privilege escalation. Although this issue was fixed in Docker Engine v18.09.1 in January 2019, the fix was not carried forward to later major versions, resulting in a regression. Anyone who depends on authorization plugins that introspect the request and/or response body to make access control decisions is potentially impacted.\\n\\nDocker EE v19.03.x and all versions of Mirantis Container Runtime are not vulnerable.\\n\\ndocker-ce v27.1.1 containes patches to fix the vulnerability. Patches have also been merged into the master, 19.03, 20.0, 23.0, 24.0, 25.0, 26.0, and 26.1 release branches. If one is unable to upgrade immediately, avoid using AuthZ plugins and/or restrict access to the Docker API to trusted parties, following the principle of least privilege.\"},{\"lang\":\"es\",\"value\":\"Moby es un proyecto de c\u00f3digo abierto creado por Docker para la contenedorizaci\u00f3n de software. Se ha detectado una vulnerabilidad de seguridad en determinadas versiones de Docker Engine, que podr\u00eda permitir a un atacante omitir los complementos de autorizaci\u00f3n (AuthZ) en circunstancias espec\u00edficas. La probabilidad b\u00e1sica de que esto sea explotado es baja. Utilizando una solicitud de API especialmente manipulada, un cliente de Engine API podr\u00eda hacer que el daemon reenv\u00ede la solicitud o respuesta a un complemento de autorizaci\u00f3n sin el cuerpo. En determinadas circunstancias, el complemento de autorizaci\u00f3n puede permitir una solicitud que, de otro modo, habr\u00eda rechazado si se le hubiera enviado el organismo. En 2018 se descubri\u00f3 un problema de seguridad en el que un atacante pod\u00eda omitir los complementos de AuthZ mediante una solicitud API especialmente manipulada. Esto podr\u00eda dar lugar a acciones no autorizadas, incluida la escalada de privilegios. Aunque este problema se solucion\u00f3 en Docker Engine v18.09.1 en enero de 2019, la soluci\u00f3n no se traslad\u00f3 a versiones principales posteriores, lo que result\u00f3 en una regresi\u00f3n. Cualquiera que dependa de complementos de autorizaci\u00f3n que introspeccionen el cuerpo de solicitud y/o respuesta para tomar decisiones de control de acceso se ver\u00e1 potencialmente afectado. Docker EE v19.03.x y todas las versiones de Mirantis Container Runtime no son vulnerables. docker-ce v27.1.1 contiene parches para corregir la vulnerabilidad. Los parches tambi\u00e9n se han fusionado en las ramas de versi\u00f3n maestra, 19.0, 20.0, 23.0, 24.0, 25.0, 26.0 y 26.1. Si uno no puede actualizar inmediatamente, evite usar complementos de AuthZ y/o restrinja el acceso a la API de Docker a partes confiables, siguiendo el principio de privilegio m\u00ednimo.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":9.9,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.1,\"impactScore\":6.0}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-187\"},{\"lang\":\"en\",\"value\":\"CWE-444\"},{\"lang\":\"en\",\"value\":\"CWE-863\"}]}],\"references\":[{\"url\":\"https://github.com/moby/moby/commit/411e817ddf710ff8e08fa193da80cb78af708191\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/moby/moby/commit/42f40b1d6dd7562342f832b9cd2adf9e668eeb76\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/moby/moby/commit/65cc597cea28cdc25bea3b8a86384b4251872919\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/moby/moby/commit/852759a7df454cbf88db4e954c919becd48faa9b\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/moby/moby/commit/a31260625655cff9ae226b51757915e275e304b0\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/moby/moby/commit/a79fabbfe84117696a19671f4aa88b82d0f64fc1\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/moby/moby/commit/ae160b4edddb72ef4bd71f66b975a1a1cc434f00\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/moby/moby/commit/ae2b3666c517c96cbc2adf1af5591a6b00d4ec0f\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/moby/moby/commit/cc13f952511154a2866bddbb7dddebfe9e83b801\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/moby/moby/commit/fc274cd2ff4cf3b48c91697fb327dd1fb95588fb\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/moby/moby/security/advisories/GHSA-v23v-6jw2-98fq\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://www.docker.com/blog/docker-security-advisory-docker-engine-authz-plugin\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/moby/moby/commit/411e817ddf710ff8e08fa193da80cb78af708191\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/moby/moby/commit/42f40b1d6dd7562342f832b9cd2adf9e668eeb76\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/moby/moby/commit/65cc597cea28cdc25bea3b8a86384b4251872919\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/moby/moby/commit/852759a7df454cbf88db4e954c919becd48faa9b\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/moby/moby/commit/a31260625655cff9ae226b51757915e275e304b0\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/moby/moby/commit/a79fabbfe84117696a19671f4aa88b82d0f64fc1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/moby/moby/commit/ae160b4edddb72ef4bd71f66b975a1a1cc434f00\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/moby/moby/commit/ae2b3666c517c96cbc2adf1af5591a6b00d4ec0f\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/moby/moby/commit/cc13f952511154a2866bddbb7dddebfe9e83b801\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/moby/moby/commit/fc274cd2ff4cf3b48c91697fb327dd1fb95588fb\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/moby/moby/security/advisories/GHSA-v23v-6jw2-98fq\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2024/10/msg00009.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20240802-0001/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.docker.com/blog/docker-security-advisory-docker-engine-authz-plugin\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.