cve-2024-41110
Vulnerability from cvelistv5
Published
2024-07-24 16:49
Modified
2024-10-13 21:03
Severity ?
Summary
Moby is an open-source project created by Docker for software containerization. A security vulnerability has been detected in certain versions of Docker Engine, which could allow an attacker to bypass authorization plugins (AuthZ) under specific circumstances. The base likelihood of this being exploited is low. Using a specially-crafted API request, an Engine API client could make the daemon forward the request or response to an authorization plugin without the body. In certain circumstances, the authorization plugin may allow a request which it would have otherwise denied if the body had been forwarded to it. A security issue was discovered In 2018, where an attacker could bypass AuthZ plugins using a specially crafted API request. This could lead to unauthorized actions, including privilege escalation. Although this issue was fixed in Docker Engine v18.09.1 in January 2019, the fix was not carried forward to later major versions, resulting in a regression. Anyone who depends on authorization plugins that introspect the request and/or response body to make access control decisions is potentially impacted. Docker EE v19.03.x and all versions of Mirantis Container Runtime are not vulnerable. docker-ce v27.1.1 containes patches to fix the vulnerability. Patches have also been merged into the master, 19.03, 20.0, 23.0, 24.0, 25.0, 26.0, and 26.1 release branches. If one is unable to upgrade immediately, avoid using AuthZ plugins and/or restrict access to the Docker API to trusted parties, following the principle of least privilege.
References
security-advisories@github.comhttps://github.com/moby/moby/commit/411e817ddf710ff8e08fa193da80cb78af708191
security-advisories@github.comhttps://github.com/moby/moby/commit/42f40b1d6dd7562342f832b9cd2adf9e668eeb76
security-advisories@github.comhttps://github.com/moby/moby/commit/65cc597cea28cdc25bea3b8a86384b4251872919
security-advisories@github.comhttps://github.com/moby/moby/commit/852759a7df454cbf88db4e954c919becd48faa9b
security-advisories@github.comhttps://github.com/moby/moby/commit/a31260625655cff9ae226b51757915e275e304b0
security-advisories@github.comhttps://github.com/moby/moby/commit/a79fabbfe84117696a19671f4aa88b82d0f64fc1
security-advisories@github.comhttps://github.com/moby/moby/commit/ae160b4edddb72ef4bd71f66b975a1a1cc434f00
security-advisories@github.comhttps://github.com/moby/moby/commit/ae2b3666c517c96cbc2adf1af5591a6b00d4ec0f
security-advisories@github.comhttps://github.com/moby/moby/commit/cc13f952511154a2866bddbb7dddebfe9e83b801
security-advisories@github.comhttps://github.com/moby/moby/commit/fc274cd2ff4cf3b48c91697fb327dd1fb95588fb
security-advisories@github.comhttps://github.com/moby/moby/security/advisories/GHSA-v23v-6jw2-98fq
security-advisories@github.comhttps://www.docker.com/blog/docker-security-advisory-docker-engine-authz-plugin
af854a3a-2127-422b-91ae-364da2661108https://github.com/moby/moby/commit/411e817ddf710ff8e08fa193da80cb78af708191
af854a3a-2127-422b-91ae-364da2661108https://github.com/moby/moby/commit/42f40b1d6dd7562342f832b9cd2adf9e668eeb76
af854a3a-2127-422b-91ae-364da2661108https://github.com/moby/moby/commit/65cc597cea28cdc25bea3b8a86384b4251872919
af854a3a-2127-422b-91ae-364da2661108https://github.com/moby/moby/commit/852759a7df454cbf88db4e954c919becd48faa9b
af854a3a-2127-422b-91ae-364da2661108https://github.com/moby/moby/commit/a31260625655cff9ae226b51757915e275e304b0
af854a3a-2127-422b-91ae-364da2661108https://github.com/moby/moby/commit/a79fabbfe84117696a19671f4aa88b82d0f64fc1
af854a3a-2127-422b-91ae-364da2661108https://github.com/moby/moby/commit/ae160b4edddb72ef4bd71f66b975a1a1cc434f00
af854a3a-2127-422b-91ae-364da2661108https://github.com/moby/moby/commit/ae2b3666c517c96cbc2adf1af5591a6b00d4ec0f
af854a3a-2127-422b-91ae-364da2661108https://github.com/moby/moby/commit/cc13f952511154a2866bddbb7dddebfe9e83b801
af854a3a-2127-422b-91ae-364da2661108https://github.com/moby/moby/commit/fc274cd2ff4cf3b48c91697fb327dd1fb95588fb
af854a3a-2127-422b-91ae-364da2661108https://github.com/moby/moby/security/advisories/GHSA-v23v-6jw2-98fq
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2024/10/msg00009.html
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20240802-0001/
af854a3a-2127-422b-91ae-364da2661108https://www.docker.com/blog/docker-security-advisory-docker-engine-authz-plugin
Impacted products
Vendor Product Version
moby moby Version: >= 19.03.0, <= 19.03.15
Version: >= 20.0.0, <= 20.10.27
Version: >= 23.0.0, <= 23.0.14
Version: >= 24.0.0, <= 24.0.9
Version: >= 25.0.0, <= 25.0.5
Version: >= 26.0.0, <= 26.0.2
Version: >= 26.1.0, <= 26.1.14
Version: >= 27.0.0, <= 27.0.3
Version: = 27.1.0
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:docker:moby:19.0.0:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "moby",
                  vendor: "docker",
                  versions: [
                     {
                        lessThanOrEqual: "19.03.15",
                        status: "affected",
                        version: "19.0.0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:docker:moby:20.0.0:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "moby",
                  vendor: "docker",
                  versions: [
                     {
                        lessThanOrEqual: "20.10.27",
                        status: "affected",
                        version: "20.0.0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:docker:moby:23.0.0:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "moby",
                  vendor: "docker",
                  versions: [
                     {
                        lessThanOrEqual: "23.0.14",
                        status: "affected",
                        version: "23.0.0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:docker:moby:24.0.0:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "moby",
                  vendor: "docker",
                  versions: [
                     {
                        lessThanOrEqual: "24.0.9",
                        status: "affected",
                        version: "24.0.0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:docker:moby:25.0.0:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "moby",
                  vendor: "docker",
                  versions: [
                     {
                        lessThanOrEqual: "25.0.5",
                        status: "affected",
                        version: "25.0.0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:docker:moby:26.1.0:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "moby",
                  vendor: "docker",
                  versions: [
                     {
                        lessThanOrEqual: "26.0.2",
                        status: "affected",
                        version: "26.0.0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:docker:moby:27.0.0:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "moby",
                  vendor: "docker",
                  versions: [
                     {
                        lessThanOrEqual: "26.1.14",
                        status: "affected",
                        version: "26.1.0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:docker:moby:27.1.0:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "moby",
                  vendor: "docker",
                  versions: [
                     {
                        status: "affected",
                        version: "27.1.0",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:docker:moby:26.0.0:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "moby",
                  vendor: "docker",
                  versions: [
                     {
                        lessThanOrEqual: "26.0.2",
                        status: "affected",
                        version: "26.0.0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:docker:moby:26.1.0:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "moby",
                  vendor: "docker",
                  versions: [
                     {
                        lessThanOrEqual: "26.1.14",
                        status: "affected",
                        version: "26.1.0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:docker:moby:27.0.0:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "moby",
                  vendor: "docker",
                  versions: [
                     {
                        lessThanOrEqual: "27.0.3",
                        status: "affected",
                        version: "27.0.0",
                        versionType: "custom",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-41110",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-07-26T03:55:30.375492Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-07-29T21:01:46.898Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-10-13T21:03:34.392Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "https://github.com/moby/moby/security/advisories/GHSA-v23v-6jw2-98fq",
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://github.com/moby/moby/security/advisories/GHSA-v23v-6jw2-98fq",
               },
               {
                  name: "https://github.com/moby/moby/commit/411e817ddf710ff8e08fa193da80cb78af708191",
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/moby/moby/commit/411e817ddf710ff8e08fa193da80cb78af708191",
               },
               {
                  name: "https://github.com/moby/moby/commit/42f40b1d6dd7562342f832b9cd2adf9e668eeb76",
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/moby/moby/commit/42f40b1d6dd7562342f832b9cd2adf9e668eeb76",
               },
               {
                  name: "https://github.com/moby/moby/commit/65cc597cea28cdc25bea3b8a86384b4251872919",
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/moby/moby/commit/65cc597cea28cdc25bea3b8a86384b4251872919",
               },
               {
                  name: "https://github.com/moby/moby/commit/852759a7df454cbf88db4e954c919becd48faa9b",
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/moby/moby/commit/852759a7df454cbf88db4e954c919becd48faa9b",
               },
               {
                  name: "https://github.com/moby/moby/commit/a31260625655cff9ae226b51757915e275e304b0",
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/moby/moby/commit/a31260625655cff9ae226b51757915e275e304b0",
               },
               {
                  name: "https://github.com/moby/moby/commit/a79fabbfe84117696a19671f4aa88b82d0f64fc1",
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/moby/moby/commit/a79fabbfe84117696a19671f4aa88b82d0f64fc1",
               },
               {
                  name: "https://github.com/moby/moby/commit/ae160b4edddb72ef4bd71f66b975a1a1cc434f00",
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/moby/moby/commit/ae160b4edddb72ef4bd71f66b975a1a1cc434f00",
               },
               {
                  name: "https://github.com/moby/moby/commit/ae2b3666c517c96cbc2adf1af5591a6b00d4ec0f",
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/moby/moby/commit/ae2b3666c517c96cbc2adf1af5591a6b00d4ec0f",
               },
               {
                  name: "https://github.com/moby/moby/commit/cc13f952511154a2866bddbb7dddebfe9e83b801",
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/moby/moby/commit/cc13f952511154a2866bddbb7dddebfe9e83b801",
               },
               {
                  name: "https://github.com/moby/moby/commit/fc274cd2ff4cf3b48c91697fb327dd1fb95588fb",
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/moby/moby/commit/fc274cd2ff4cf3b48c91697fb327dd1fb95588fb",
               },
               {
                  name: "https://www.docker.com/blog/docker-security-advisory-docker-engine-authz-plugin",
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.docker.com/blog/docker-security-advisory-docker-engine-authz-plugin",
               },
               {
                  url: "https://security.netapp.com/advisory/ntap-20240802-0001/",
               },
               {
                  url: "https://lists.debian.org/debian-lts-announce/2024/10/msg00009.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "moby",
               vendor: "moby",
               versions: [
                  {
                     status: "affected",
                     version: ">= 19.03.0, <= 19.03.15",
                  },
                  {
                     status: "affected",
                     version: ">= 20.0.0, <= 20.10.27",
                  },
                  {
                     status: "affected",
                     version: ">= 23.0.0, <= 23.0.14",
                  },
                  {
                     status: "affected",
                     version: ">= 24.0.0, <= 24.0.9",
                  },
                  {
                     status: "affected",
                     version: ">= 25.0.0, <= 25.0.5",
                  },
                  {
                     status: "affected",
                     version: ">= 26.0.0, <= 26.0.2",
                  },
                  {
                     status: "affected",
                     version: ">= 26.1.0, <= 26.1.14",
                  },
                  {
                     status: "affected",
                     version: ">= 27.0.0, <= 27.0.3",
                  },
                  {
                     status: "affected",
                     version: "= 27.1.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Moby is an open-source project created by Docker for software containerization. A security vulnerability has been detected in certain versions of Docker Engine, which could allow an attacker to bypass authorization plugins (AuthZ) under specific circumstances. The base likelihood of this being exploited is low.\n\nUsing a specially-crafted API request, an Engine API client could make the daemon forward the request or response to an authorization plugin without the body. In certain circumstances, the authorization plugin may allow a request which it would have otherwise denied if the body had been forwarded to it.\n\nA security issue was discovered In 2018, where an attacker could bypass AuthZ plugins using a specially crafted API request. This could lead to unauthorized actions, including privilege escalation. Although this issue was fixed in Docker Engine v18.09.1 in January 2019, the fix was not carried forward to later major versions, resulting in a regression. Anyone who depends on authorization plugins that introspect the request and/or response body to make access control decisions is potentially impacted.\n\nDocker EE v19.03.x and all versions of Mirantis Container Runtime are not vulnerable.\n\ndocker-ce v27.1.1 containes patches to fix the vulnerability. Patches have also been merged into the master, 19.03, 20.0, 23.0, 24.0, 25.0, 26.0, and 26.1 release branches. If one is unable to upgrade immediately, avoid using AuthZ plugins and/or restrict access to the Docker API to trusted parties, following the principle of least privilege.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 10,
                  baseSeverity: "CRITICAL",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "HIGH",
                  privilegesRequired: "LOW",
                  scope: "CHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-187",
                     description: "CWE-187: Partial String Comparison",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
            {
               descriptions: [
                  {
                     cweId: "CWE-444",
                     description: "CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
            {
               descriptions: [
                  {
                     cweId: "CWE-863",
                     description: "CWE-863: Incorrect Authorization",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-07-30T19:09:22.764Z",
            orgId: "a0819718-46f1-4df5-94e2-005712e83aaa",
            shortName: "GitHub_M",
         },
         references: [
            {
               name: "https://github.com/moby/moby/security/advisories/GHSA-v23v-6jw2-98fq",
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://github.com/moby/moby/security/advisories/GHSA-v23v-6jw2-98fq",
            },
            {
               name: "https://github.com/moby/moby/commit/411e817ddf710ff8e08fa193da80cb78af708191",
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/moby/moby/commit/411e817ddf710ff8e08fa193da80cb78af708191",
            },
            {
               name: "https://github.com/moby/moby/commit/42f40b1d6dd7562342f832b9cd2adf9e668eeb76",
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/moby/moby/commit/42f40b1d6dd7562342f832b9cd2adf9e668eeb76",
            },
            {
               name: "https://github.com/moby/moby/commit/65cc597cea28cdc25bea3b8a86384b4251872919",
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/moby/moby/commit/65cc597cea28cdc25bea3b8a86384b4251872919",
            },
            {
               name: "https://github.com/moby/moby/commit/852759a7df454cbf88db4e954c919becd48faa9b",
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/moby/moby/commit/852759a7df454cbf88db4e954c919becd48faa9b",
            },
            {
               name: "https://github.com/moby/moby/commit/a31260625655cff9ae226b51757915e275e304b0",
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/moby/moby/commit/a31260625655cff9ae226b51757915e275e304b0",
            },
            {
               name: "https://github.com/moby/moby/commit/a79fabbfe84117696a19671f4aa88b82d0f64fc1",
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/moby/moby/commit/a79fabbfe84117696a19671f4aa88b82d0f64fc1",
            },
            {
               name: "https://github.com/moby/moby/commit/ae160b4edddb72ef4bd71f66b975a1a1cc434f00",
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/moby/moby/commit/ae160b4edddb72ef4bd71f66b975a1a1cc434f00",
            },
            {
               name: "https://github.com/moby/moby/commit/ae2b3666c517c96cbc2adf1af5591a6b00d4ec0f",
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/moby/moby/commit/ae2b3666c517c96cbc2adf1af5591a6b00d4ec0f",
            },
            {
               name: "https://github.com/moby/moby/commit/cc13f952511154a2866bddbb7dddebfe9e83b801",
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/moby/moby/commit/cc13f952511154a2866bddbb7dddebfe9e83b801",
            },
            {
               name: "https://github.com/moby/moby/commit/fc274cd2ff4cf3b48c91697fb327dd1fb95588fb",
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/moby/moby/commit/fc274cd2ff4cf3b48c91697fb327dd1fb95588fb",
            },
            {
               name: "https://www.docker.com/blog/docker-security-advisory-docker-engine-authz-plugin",
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.docker.com/blog/docker-security-advisory-docker-engine-authz-plugin",
            },
         ],
         source: {
            advisory: "GHSA-v23v-6jw2-98fq",
            discovery: "UNKNOWN",
         },
         title: "Moby authz zero length regression",
      },
   },
   cveMetadata: {
      assignerOrgId: "a0819718-46f1-4df5-94e2-005712e83aaa",
      assignerShortName: "GitHub_M",
      cveId: "CVE-2024-41110",
      datePublished: "2024-07-24T16:49:53.068Z",
      dateReserved: "2024-07-15T15:53:28.321Z",
      dateUpdated: "2024-10-13T21:03:34.392Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
   "vulnerability-lookup:meta": {
      nvd: "{\"cve\":{\"id\":\"CVE-2024-41110\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2024-07-24T17:15:11.053\",\"lastModified\":\"2024-11-21T09:32:15.160\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Moby is an open-source project created by Docker for software containerization. A security vulnerability has been detected in certain versions of Docker Engine, which could allow an attacker to bypass authorization plugins (AuthZ) under specific circumstances. The base likelihood of this being exploited is low.\\n\\nUsing a specially-crafted API request, an Engine API client could make the daemon forward the request or response to an authorization plugin without the body. In certain circumstances, the authorization plugin may allow a request which it would have otherwise denied if the body had been forwarded to it.\\n\\nA security issue was discovered In 2018, where an attacker could bypass AuthZ plugins using a specially crafted API request. This could lead to unauthorized actions, including privilege escalation. Although this issue was fixed in Docker Engine v18.09.1 in January 2019, the fix was not carried forward to later major versions, resulting in a regression. Anyone who depends on authorization plugins that introspect the request and/or response body to make access control decisions is potentially impacted.\\n\\nDocker EE v19.03.x and all versions of Mirantis Container Runtime are not vulnerable.\\n\\ndocker-ce v27.1.1 containes patches to fix the vulnerability. Patches have also been merged into the master, 19.03, 20.0, 23.0, 24.0, 25.0, 26.0, and 26.1 release branches. If one is unable to upgrade immediately, avoid using AuthZ plugins and/or restrict access to the Docker API to trusted parties, following the principle of least privilege.\"},{\"lang\":\"es\",\"value\":\"Moby es un proyecto de código abierto creado por Docker para la contenedorización de software. Se ha detectado una vulnerabilidad de seguridad en determinadas versiones de Docker Engine, que podría permitir a un atacante omitir los complementos de autorización (AuthZ) en circunstancias específicas. La probabilidad básica de que esto sea explotado es baja. Utilizando una solicitud de API especialmente manipulada, un cliente de Engine API podría hacer que el daemon reenvíe la solicitud o respuesta a un complemento de autorización sin el cuerpo. En determinadas circunstancias, el complemento de autorización puede permitir una solicitud que, de otro modo, habría rechazado si se le hubiera enviado el organismo. En 2018 se descubrió un problema de seguridad en el que un atacante podía omitir los complementos de AuthZ mediante una solicitud API especialmente manipulada. Esto podría dar lugar a acciones no autorizadas, incluida la escalada de privilegios. Aunque este problema se solucionó en Docker Engine v18.09.1 en enero de 2019, la solución no se trasladó a versiones principales posteriores, lo que resultó en una regresión. Cualquiera que dependa de complementos de autorización que introspeccionen el cuerpo de solicitud y/o respuesta para tomar decisiones de control de acceso se verá potencialmente afectado. Docker EE v19.03.x y todas las versiones de Mirantis Container Runtime no son vulnerables. docker-ce v27.1.1 contiene parches para corregir la vulnerabilidad. Los parches también se han fusionado en las ramas de versión maestra, 19.0, 20.0, 23.0, 24.0, 25.0, 26.0 y 26.1. Si uno no puede actualizar inmediatamente, evite usar complementos de AuthZ y/o restrinja el acceso a la API de Docker a partes confiables, siguiendo el principio de privilegio mínimo.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":9.9,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.1,\"impactScore\":6.0}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-187\"},{\"lang\":\"en\",\"value\":\"CWE-444\"},{\"lang\":\"en\",\"value\":\"CWE-863\"}]}],\"references\":[{\"url\":\"https://github.com/moby/moby/commit/411e817ddf710ff8e08fa193da80cb78af708191\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/moby/moby/commit/42f40b1d6dd7562342f832b9cd2adf9e668eeb76\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/moby/moby/commit/65cc597cea28cdc25bea3b8a86384b4251872919\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/moby/moby/commit/852759a7df454cbf88db4e954c919becd48faa9b\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/moby/moby/commit/a31260625655cff9ae226b51757915e275e304b0\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/moby/moby/commit/a79fabbfe84117696a19671f4aa88b82d0f64fc1\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/moby/moby/commit/ae160b4edddb72ef4bd71f66b975a1a1cc434f00\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/moby/moby/commit/ae2b3666c517c96cbc2adf1af5591a6b00d4ec0f\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/moby/moby/commit/cc13f952511154a2866bddbb7dddebfe9e83b801\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/moby/moby/commit/fc274cd2ff4cf3b48c91697fb327dd1fb95588fb\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/moby/moby/security/advisories/GHSA-v23v-6jw2-98fq\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://www.docker.com/blog/docker-security-advisory-docker-engine-authz-plugin\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/moby/moby/commit/411e817ddf710ff8e08fa193da80cb78af708191\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/moby/moby/commit/42f40b1d6dd7562342f832b9cd2adf9e668eeb76\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/moby/moby/commit/65cc597cea28cdc25bea3b8a86384b4251872919\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/moby/moby/commit/852759a7df454cbf88db4e954c919becd48faa9b\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/moby/moby/commit/a31260625655cff9ae226b51757915e275e304b0\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/moby/moby/commit/a79fabbfe84117696a19671f4aa88b82d0f64fc1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/moby/moby/commit/ae160b4edddb72ef4bd71f66b975a1a1cc434f00\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/moby/moby/commit/ae2b3666c517c96cbc2adf1af5591a6b00d4ec0f\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/moby/moby/commit/cc13f952511154a2866bddbb7dddebfe9e83b801\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/moby/moby/commit/fc274cd2ff4cf3b48c91697fb327dd1fb95588fb\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/moby/moby/security/advisories/GHSA-v23v-6jw2-98fq\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2024/10/msg00009.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20240802-0001/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.docker.com/blog/docker-security-advisory-docker-engine-authz-plugin\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
      vulnrichment: {
         containers: "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://github.com/moby/moby/security/advisories/GHSA-v23v-6jw2-98fq\", \"name\": \"https://github.com/moby/moby/security/advisories/GHSA-v23v-6jw2-98fq\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://github.com/moby/moby/commit/411e817ddf710ff8e08fa193da80cb78af708191\", \"name\": \"https://github.com/moby/moby/commit/411e817ddf710ff8e08fa193da80cb78af708191\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://github.com/moby/moby/commit/42f40b1d6dd7562342f832b9cd2adf9e668eeb76\", \"name\": \"https://github.com/moby/moby/commit/42f40b1d6dd7562342f832b9cd2adf9e668eeb76\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://github.com/moby/moby/commit/65cc597cea28cdc25bea3b8a86384b4251872919\", \"name\": \"https://github.com/moby/moby/commit/65cc597cea28cdc25bea3b8a86384b4251872919\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://github.com/moby/moby/commit/852759a7df454cbf88db4e954c919becd48faa9b\", \"name\": \"https://github.com/moby/moby/commit/852759a7df454cbf88db4e954c919becd48faa9b\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://github.com/moby/moby/commit/a31260625655cff9ae226b51757915e275e304b0\", \"name\": \"https://github.com/moby/moby/commit/a31260625655cff9ae226b51757915e275e304b0\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://github.com/moby/moby/commit/a79fabbfe84117696a19671f4aa88b82d0f64fc1\", \"name\": \"https://github.com/moby/moby/commit/a79fabbfe84117696a19671f4aa88b82d0f64fc1\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://github.com/moby/moby/commit/ae160b4edddb72ef4bd71f66b975a1a1cc434f00\", \"name\": \"https://github.com/moby/moby/commit/ae160b4edddb72ef4bd71f66b975a1a1cc434f00\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://github.com/moby/moby/commit/ae2b3666c517c96cbc2adf1af5591a6b00d4ec0f\", \"name\": \"https://github.com/moby/moby/commit/ae2b3666c517c96cbc2adf1af5591a6b00d4ec0f\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://github.com/moby/moby/commit/cc13f952511154a2866bddbb7dddebfe9e83b801\", \"name\": \"https://github.com/moby/moby/commit/cc13f952511154a2866bddbb7dddebfe9e83b801\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://github.com/moby/moby/commit/fc274cd2ff4cf3b48c91697fb327dd1fb95588fb\", \"name\": \"https://github.com/moby/moby/commit/fc274cd2ff4cf3b48c91697fb327dd1fb95588fb\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://www.docker.com/blog/docker-security-advisory-docker-engine-authz-plugin\", \"name\": \"https://www.docker.com/blog/docker-security-advisory-docker-engine-authz-plugin\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20240802-0001/\"}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2024/10/msg00009.html\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-10-13T21:03:34.392Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-41110\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-07-26T03:55:30.375492Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:docker:moby:19.0.0:*:*:*:*:*:*:*\"], \"vendor\": \"docker\", \"product\": \"moby\", \"versions\": [{\"status\": \"affected\", \"version\": \"19.0.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"19.03.15\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:docker:moby:20.0.0:*:*:*:*:*:*:*\"], \"vendor\": \"docker\", \"product\": \"moby\", \"versions\": [{\"status\": \"affected\", \"version\": \"20.0.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"20.10.27\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:docker:moby:23.0.0:*:*:*:*:*:*:*\"], \"vendor\": \"docker\", \"product\": \"moby\", \"versions\": [{\"status\": \"affected\", \"version\": \"23.0.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"23.0.14\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:docker:moby:24.0.0:*:*:*:*:*:*:*\"], \"vendor\": \"docker\", \"product\": \"moby\", \"versions\": [{\"status\": \"affected\", \"version\": \"24.0.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"24.0.9\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:docker:moby:25.0.0:*:*:*:*:*:*:*\"], \"vendor\": \"docker\", \"product\": \"moby\", \"versions\": [{\"status\": \"affected\", \"version\": \"25.0.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"25.0.5\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:docker:moby:26.1.0:*:*:*:*:*:*:*\"], \"vendor\": \"docker\", \"product\": \"moby\", \"versions\": [{\"status\": \"affected\", \"version\": \"26.0.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"26.0.2\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:docker:moby:27.0.0:*:*:*:*:*:*:*\"], \"vendor\": \"docker\", \"product\": \"moby\", \"versions\": [{\"status\": \"affected\", \"version\": \"26.1.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"26.1.14\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:docker:moby:27.1.0:*:*:*:*:*:*:*\"], \"vendor\": \"docker\", \"product\": \"moby\", \"versions\": [{\"status\": \"affected\", \"version\": \"27.1.0\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:docker:moby:26.0.0:*:*:*:*:*:*:*\"], \"vendor\": \"docker\", \"product\": \"moby\", \"versions\": [{\"status\": \"affected\", \"version\": \"26.0.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"26.0.2\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:docker:moby:26.1.0:*:*:*:*:*:*:*\"], \"vendor\": \"docker\", \"product\": \"moby\", \"versions\": [{\"status\": \"affected\", \"version\": \"26.1.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"26.1.14\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:docker:moby:27.0.0:*:*:*:*:*:*:*\"], \"vendor\": \"docker\", \"product\": \"moby\", \"versions\": [{\"status\": \"affected\", \"version\": \"27.0.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"27.0.3\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-07-24T20:02:34.755Z\"}}], \"cna\": {\"title\": \"Moby authz zero length regression\", \"source\": {\"advisory\": \"GHSA-v23v-6jw2-98fq\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 10, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"vendor\": \"moby\", \"product\": \"moby\", \"versions\": [{\"status\": \"affected\", \"version\": \">= 19.03.0, <= 19.03.15\"}, {\"status\": \"affected\", \"version\": \">= 20.0.0, <= 20.10.27\"}, {\"status\": \"affected\", \"version\": \">= 23.0.0, <= 23.0.14\"}, {\"status\": \"affected\", \"version\": \">= 24.0.0, <= 24.0.9\"}, {\"status\": \"affected\", \"version\": \">= 25.0.0, <= 25.0.5\"}, {\"status\": \"affected\", \"version\": \">= 26.0.0, <= 26.0.2\"}, {\"status\": \"affected\", \"version\": \">= 26.1.0, <= 26.1.14\"}, {\"status\": \"affected\", \"version\": \">= 27.0.0, <= 27.0.3\"}, {\"status\": \"affected\", \"version\": \"= 27.1.0\"}]}], \"references\": [{\"url\": \"https://github.com/moby/moby/security/advisories/GHSA-v23v-6jw2-98fq\", \"name\": \"https://github.com/moby/moby/security/advisories/GHSA-v23v-6jw2-98fq\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://github.com/moby/moby/commit/411e817ddf710ff8e08fa193da80cb78af708191\", \"name\": \"https://github.com/moby/moby/commit/411e817ddf710ff8e08fa193da80cb78af708191\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/moby/moby/commit/42f40b1d6dd7562342f832b9cd2adf9e668eeb76\", \"name\": \"https://github.com/moby/moby/commit/42f40b1d6dd7562342f832b9cd2adf9e668eeb76\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/moby/moby/commit/65cc597cea28cdc25bea3b8a86384b4251872919\", \"name\": \"https://github.com/moby/moby/commit/65cc597cea28cdc25bea3b8a86384b4251872919\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/moby/moby/commit/852759a7df454cbf88db4e954c919becd48faa9b\", \"name\": \"https://github.com/moby/moby/commit/852759a7df454cbf88db4e954c919becd48faa9b\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/moby/moby/commit/a31260625655cff9ae226b51757915e275e304b0\", \"name\": \"https://github.com/moby/moby/commit/a31260625655cff9ae226b51757915e275e304b0\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/moby/moby/commit/a79fabbfe84117696a19671f4aa88b82d0f64fc1\", \"name\": \"https://github.com/moby/moby/commit/a79fabbfe84117696a19671f4aa88b82d0f64fc1\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/moby/moby/commit/ae160b4edddb72ef4bd71f66b975a1a1cc434f00\", \"name\": \"https://github.com/moby/moby/commit/ae160b4edddb72ef4bd71f66b975a1a1cc434f00\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/moby/moby/commit/ae2b3666c517c96cbc2adf1af5591a6b00d4ec0f\", \"name\": \"https://github.com/moby/moby/commit/ae2b3666c517c96cbc2adf1af5591a6b00d4ec0f\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/moby/moby/commit/cc13f952511154a2866bddbb7dddebfe9e83b801\", \"name\": \"https://github.com/moby/moby/commit/cc13f952511154a2866bddbb7dddebfe9e83b801\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/moby/moby/commit/fc274cd2ff4cf3b48c91697fb327dd1fb95588fb\", \"name\": \"https://github.com/moby/moby/commit/fc274cd2ff4cf3b48c91697fb327dd1fb95588fb\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://www.docker.com/blog/docker-security-advisory-docker-engine-authz-plugin\", \"name\": \"https://www.docker.com/blog/docker-security-advisory-docker-engine-authz-plugin\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Moby is an open-source project created by Docker for software containerization. A security vulnerability has been detected in certain versions of Docker Engine, which could allow an attacker to bypass authorization plugins (AuthZ) under specific circumstances. The base likelihood of this being exploited is low.\\n\\nUsing a specially-crafted API request, an Engine API client could make the daemon forward the request or response to an authorization plugin without the body. In certain circumstances, the authorization plugin may allow a request which it would have otherwise denied if the body had been forwarded to it.\\n\\nA security issue was discovered In 2018, where an attacker could bypass AuthZ plugins using a specially crafted API request. This could lead to unauthorized actions, including privilege escalation. Although this issue was fixed in Docker Engine v18.09.1 in January 2019, the fix was not carried forward to later major versions, resulting in a regression. Anyone who depends on authorization plugins that introspect the request and/or response body to make access control decisions is potentially impacted.\\n\\nDocker EE v19.03.x and all versions of Mirantis Container Runtime are not vulnerable.\\n\\ndocker-ce v27.1.1 containes patches to fix the vulnerability. Patches have also been merged into the master, 19.03, 20.0, 23.0, 24.0, 25.0, 26.0, and 26.1 release branches. If one is unable to upgrade immediately, avoid using AuthZ plugins and/or restrict access to the Docker API to trusted parties, following the principle of least privilege.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-187\", \"description\": \"CWE-187: Partial String Comparison\"}]}, {\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-444\", \"description\": \"CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')\"}]}, {\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-863\", \"description\": \"CWE-863: Incorrect Authorization\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2024-07-30T19:09:22.764Z\"}}}",
         cveMetadata: "{\"cveId\": \"CVE-2024-41110\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-10-13T21:03:34.392Z\", \"dateReserved\": \"2024-07-15T15:53:28.321Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2024-07-24T16:49:53.068Z\", \"assignerShortName\": \"GitHub_M\"}",
         dataType: "CVE_RECORD",
         dataVersion: "5.1",
      },
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.