Vulnerabilities > CVE-2018-15514 - Deserialization of Untrusted Data vulnerability in Docker
Attack vector
NETWORK Attack complexity
LOW Privileges required
LOW Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
HandleRequestAsync in Docker for Windows before 18.06.0-ce-rc3-win68 (edge) and before 18.06.0-ce-win72 (stable) deserialized requests over the \\.\pipe\dockerBackend named pipe without verifying the validity of the deserialized .NET objects. This would allow a malicious user in the "docker-users" group (who may not otherwise have administrator access) to escalate to administrator privileges.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Nessus
NASL family | Windows |
NASL id | DOCKER_FOR_WINDOWS_CVE-2018-15514.NASL |
description | The version of Docker for Windows installed on the remote Windows host is stable channel < 18.06.0-ce-win70 or edge channel < 18.06.0-ce-rc3-win68. It is, therefore, affected by a remote privilege escalation vulnerability. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 117358 |
published | 2018-09-07 |
reporter | This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/117358 |
title | Docker for Windows stable < 18.06.0-ce-win70 / edge < 18.06.0-ce-rc3-win68 Remote Privilege Escalation Vulnerability |
code |
|
References
- http://www.securityfocus.com/bid/105202
- http://www.securityfocus.com/bid/105202
- https://docs.docker.com/docker-for-windows/edge-release-notes/
- https://docs.docker.com/docker-for-windows/edge-release-notes/
- https://docs.docker.com/docker-for-windows/release-notes/
- https://docs.docker.com/docker-for-windows/release-notes/
- https://srcincite.io/blog/2018/08/31/you-cant-contain-me-analyzing-and-exploiting-an-elevation-of-privilege-in-docker-for-windows.html
- https://srcincite.io/blog/2018/08/31/you-cant-contain-me-analyzing-and-exploiting-an-elevation-of-privilege-in-docker-for-windows.html