cve/2022/CVE-2022-38730.md

18 lines
926 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-38730](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38730)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Docker Desktop for Windows before 4.6 allows attackers to overwrite any file through the windowscontainers/start dockerBackendV2 API by controlling the data-root field inside the DaemonJSON field in the WindowsContainerStartRequest class. This allows exploiting a symlink vulnerability in ..\dataRoot\network\files\local-kv.db because of a TOCTOU race condition.
### POC
#### Reference
- https://www.cyberark.com/resources/threat-research-blog/breaking-docker-named-pipes-systematically-docker-desktop-privilege-escalation-part-2
#### Github
No PoCs found on GitHub currently.