cvelist/2020/7xxx/CVE-2020-7606.json

62 lines
1.9 KiB
JSON
Raw Normal View History

2020-01-21 23:01:08 +00:00
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-7606",
2020-03-15 22:01:14 +00:00
"ASSIGNER": "report@snyk.io",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "docker-compose-remote-api",
"version": {
"version_data": [
{
"version_value": "All versions including 0.1.4"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Command Injection"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://snyk.io/vuln/SNYK-JS-DOCKERCOMPOSEREMOTEAPI-560125",
"url": "https://snyk.io/vuln/SNYK-JS-DOCKERCOMPOSEREMOTEAPI-560125"
}
]
2020-01-21 23:01:08 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2020-03-15 22:01:14 +00:00
"value": "docker-compose-remote-api through 0.1.4 allows execution of arbitrary commands. Within 'index.js' of the package, the function 'exec(serviceName, cmd, fnStdout, fnStderr, fnExit)' uses the variable 'serviceName' which can be controlled by users without any sanitization."
2020-01-21 23:01:08 +00:00
}
]
}
}