Miggo Logo

GHSA-vp35-85q5-9f25:
Container build can leak any path on the host into the container

N/A

CVSS Score

Basic Information

CVE ID
-
EPSS Score
-
Published
11/11/2022
Updated
7/8/2024
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/docker/dockergo<= 20.10.1920.10.20

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability primarily stems from Git's CVE-2022-39253, which allows malicious repositories to bypass path restrictions during cloning. While Moby/Docker's build process interacts with Git, the vulnerability is not directly caused by specific functions in Moby's codebase but rather by the integration with unpatched Git versions. The advisory describes mitigations in Moby (e.g., discarding .git directories by default in BuildKit) but does not explicitly name vulnerable functions. Without access to commit diffs or patch details, it is impossible to pinpoint specific Moby functions with high confidence. The vulnerability manifests due to the interaction with Git's flawed behavior, not due to inherently vulnerable code in Moby itself.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### **s*ription Mo*y is t** op*n sour** Linux *ont*in*r runtim* *n* s*t o* *ompon*nts us** to *uil* * v*ri*ty o* *ownstr**m *ont*in*r runtim*s, in*lu*in* *o*k*r **, Mir*ntis *ont*in*r Runtim* (*orm*rly *o*k*r **), *n* *o*k*r **sktop. Mo*y *llows *or

Reasoning

T** vuln*r**ility prim*rily st*ms *rom *it's *V*-****-*****, w*i** *llows m*li*ious r*positori*s to *yp*ss p*t* r*stri*tions *urin* *lonin*. W*il* Mo*y/*o*k*r's *uil* pro**ss int*r**ts wit* *it, t** vuln*r**ility is not *ir**tly **us** *y sp**i*i* *u