CVE-2018-15664
Public on 2019-05-23
        Modified on 2021-12-09
        
      Description
            
              A flaw was discovered in the API endpoint behind the "docker cp" command. The endpoint is vulnerable to a Time Of Check to Time Of Use (TOCTOU) vulnerability in the way it handles symbolic links inside a container. An attacker who has compromised an existing container can cause arbitrary files on the host filesystem to be read/written when an administrator tries to copy a file from/to the container.
            
          Severity
          
          See what this means
        CVSS v3 Base Score
          
          See breakdown
        Affected Packages
| Platform | Package | Release Date | Advisory | Status | 
|---|---|---|---|---|
| Amazon Linux 1 | docker | 2019-07-17 | ALAS-2019-1245 | Fixed | 
| Amazon Linux 2 - Docker Extra | docker | 2021-11-18 | ALAS2DOCKER-2021-004 | Fixed | 
| Amazon Linux 2 - Aws-nitro-enclaves-cli Extra | docker | 2021-11-18 | ALAS2NITRO-ENCLAVES-2021-004 | Fixed | 
CVSS Scores
| Score Type | Score | Vector | |
|---|---|---|---|
| Amazon Linux | CVSSv2 | 6.2 | AV:L/AC:H/Au:N/C:C/I:C/A:C | 
| Amazon Linux | CVSSv3 | 7.5 | CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H | 
| NVD | CVSSv2 | 6.2 | AV:L/AC:H/Au:N/C:C/I:C/A:C | 
| NVD | CVSSv3 | 7.5 | CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H |