Lucene search

K
cve[email protected]CVE-2022-38730
HistoryApr 27, 2023 - 8:15 p.m.

CVE-2022-38730

2023-04-2720:15:40
CWE-59
CWE-367
web.nvd.nist.gov
18
cve
docker
windows
security
vulnerability
file overwrite
api
symlink
toctou race condition

6.3 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H

6.2 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Docker Desktop for Windows before 4.6 allows attackers to overwrite any file through the windowscontainers/start dockerBackendV2 API by controlling the data-root field inside the DaemonJSON field in the WindowsContainerStartRequest class. This allows exploiting a symlink vulnerability in …\dataRoot\network\files\local-kv.db because of a TOCTOU race condition.

Affected configurations

NVD
Node
dockerdesktopRange<4.6.0windows
CPENameOperatorVersion
docker:desktopdocker desktoplt4.6.0

6.3 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H

6.2 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Related for CVE-2022-38730