Files
CVEs-PoC/2014/CVE-2014-8179.md
T
2024-05-26 14:27:05 +02:00

20 lines
954 B
Markdown

### [CVE-2014-8179](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8179)
![](https://img.shields.io/static/v1?label=Product&message=CS%20Docker%20Engine&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Docker%20Engine&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20before%201.6.2-CS7%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20before%201.8.3%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Other&color=brighgreen)
### Description
Docker Engine before 1.8.3 and CS Docker Engine before 1.6.2-CS7 does not properly validate and extract the manifest object from its JSON representation during a pull, which allows attackers to inject new attributes in a JSON object and bypass pull-by-digest validation.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/xxg1413/docker-security