CVE-2021-21284Path Traversal in Docker

Severity
6.8MEDIUMNVD
EPSS
0.0%
top 94.65%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 2
Latest updateJan 31

Description

In Docker before versions 9.03.15, 20.10.3 there is a vulnerability involving the --userns-remap option in which access to remapped root allows privilege escalation to real root. When using "--userns-remap", if the root user in the remapped namespace has access to the host filesystem they can modify files under "/var/lib/docker/" that cause writing files with extended privileges. Versions 20.10.3 and 19.03.15 contain patches that prevent privilege escalation from remapped user.

CVSS vector

CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:NExploitability: 2.3 | Impact: 4.0

Affected Packages4 packages

NVDdocker/docker20.0.020.10.3+1
CVEListV5moby/moby< 19.03.15+1
Gogithub.com/moby_moby20.10.0-beta120.10.3+1

Also affects: Debian Linux 10.0

Patches

🔴Vulnerability Details

4
GHSA
moby Access to remapped root allows privilege escalation to real root2024-01-31
OSV
moby Access to remapped root allows privilege escalation to real root2024-01-31
CVEList
privilege escalation in Moby2021-02-02
OSV
CVE-2021-21284: In Docker before versions 92021-02-02

📋Vendor Advisories

3
Microsoft
privilege escalation in Moby2021-02-09
Red Hat
docker: access to remapped root allows privilege escalation to real root2021-02-02
Debian
CVE-2021-21284: docker.io - In Docker before versions 9.03.15, 20.10.3 there is a vulnerability involving th...2021
CVE-2021-21284 — Path Traversal in Docker | cvebase