CVE-2021-41092
Docker CLI leaks private registry credentials to registry-1.docker.io
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Docker CLI is the command line interface for the docker container runtime. A bug was found in the Docker CLI where running `docker login my-private-registry.example.com` with a misconfigured configuration file (typically `~/.docker/config.json`) listing a `credsStore` or `credHelpers` that could not be executed would result in any provided credentials being sent to `registry-1.docker.io` rather than the intended private registry. This bug has been fixed in Docker CLI 20.10.9. Users should update to this version as soon as possible. For users unable to update ensure that any configured credsStore or credHelpers entries in the configuration file reference an installed credential helper that is executable and on the PATH.
Docker CLI es la interfaz de línea de comandos para el tiempo de ejecución del contenedor Docker. Se encontró un bug en Docker CLI en el que la ejecución de "docker login my-private-registry.example.com" con un archivo de configuración configurado inapropiadamente (normalmente "~/.docker/config.json") con una lista de "credsStore" o "credHelpers" que no podía ser ejecutada, resultaría en que cualquier credencial proporcionada fuera enviada a "registry-1.docker.io" en lugar del registro privado previsto. Este bug ha sido corregido en Docker CLI versión 20.10.9. Los usuarios deben actualizar a esta versión tan pronto como sea posible. Para usuarios que no puedan actualizar, asegúrese de que las entradas credsStore o credHelpers configuradas en el archivo de configuración hagan referencia a un ayudante de credenciales instalado que sea ejecutable y esté en el PATH
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-09-15 CVE Reserved
- 2021-10-04 CVE Published
- 2024-06-19 EPSS Updated
- 2024-08-04 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
- CWE-522: Insufficiently Protected Credentials
CAPEC
References (5)
URL | Tag | Source |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-222547.pdf | X_refsource_confirm | |
https://github.com/docker/cli/security/advisories/GHSA-99pg-grm5-qq3v | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/docker/cli/commit/893e52cf4ba4b048d72e99748e0f86b2767c6c6b | 2023-11-07 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Docker Search vendor "Docker" | Command Line Interface Search vendor "Docker" for product "Command Line Interface" | < 20.10.9 Search vendor "Docker" for product "Command Line Interface" and version " < 20.10.9" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 34 Search vendor "Fedoraproject" for product "Fedora" and version "34" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 35 Search vendor "Fedoraproject" for product "Fedora" and version "35" | - |
Affected
|