René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

163 lines
5.2 KiB
JSON

{
"id": "CVE-2020-29591",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-12-11T15:15:12.297",
"lastModified": "2020-12-15T17:39:29.010",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Versions of the Official registry Docker images through 2.7.0 contain a blank password for the root user. Systems deployed using affected versions of the registry container may allow a remote attacker to achieve root access with a blank password."
},
{
"lang": "es",
"value": "Las versiones de las im\u00e1genes de Docker de Official registry versiones hasta 2.7.0, contienen una contrase\u00f1a en blanco para el usuario root. Los sistemas implementados con versiones afectadas del contenedor de registro pueden permitir a un atacante remoto conseguir acceso root con una contrase\u00f1a en blanco"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-521"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:docker:registry:2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "23AB982F-CC7B-4104-964C-B3244FF76F9F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:docker:registry:2.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C0FE7957-1316-44DC-B62A-5C19211D9A48"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:docker:registry:2.5.0:rc:*:*:*:*:*:*",
"matchCriteriaId": "1D76F61E-59ED-4003-A55D-DF1FF057BE9B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:docker:registry:2.5.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "149472A1-B0A8-4BE9-BB5A-FDF7436204D8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:docker:registry:2.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A529E442-6D35-4050-A198-02A503B80516"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:docker:registry:2.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "97C988BE-2181-4989-A6F9-199F3D4E545A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:docker:registry:2.6.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "7DB92432-1EC2-47D2-AB5D-76EF9BAE1B0B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:docker:registry:2.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EDF2696A-DECF-406A-A4CA-FEA287C4801A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:docker:registry:2.6.1:rc2:*:*:*:*:*:*",
"matchCriteriaId": "C39B5FC3-FC04-40BB-B55A-E79B3D14419C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:docker:registry:2.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CA939748-6F3A-440F-9867-3370E823D309"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/docker/distribution-library-image",
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/donghyunlee00/CVE/blob/main/CVE-2020-29591",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://hub.docker.com/_/registry",
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}