Pivotal + VMware: Transforming how more of the world builds software

All Vulnerability Reports

CVE-2019-13139: Docker build code execution


Severity

High

Vendor

Pivotal

Description

Pivotal Container Service (1.4.x versions prior to 1.4.3) depends on a vulnerable version of docker (versions prior to 18.09.4), where an attacker who is capable of supplying or manipulating the build path for the "docker build" command would be able to gain command execution. An issue exists in the way "docker build" processes remote git URLs, and results in command injection into the underlying "git clone" command, leading to code execution in the context of the user executing the "docker build" command. This occurs because git ref can be misinterpreted as a flag.

Affected Pivotal Products and Versions

Severity is high unless otherwise noted.

  • Pivotal Container Service (PKS)
    • 1.4 versions prior to 1.4.3
Mitigation

Users of affected versions should apply the following mitigation or upgrade. Releases that have fixed this issue include:

  • Pivotal Container Service (PKS)
    • 1.4.3
References
History

2019-10-15: Initial vulnerability report published.

Contact us