2023-05-16 16:11:17 +02:00

24 lines
878 B
JSON

{
"id": "CVE-2022-34292",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-27T20:15:40.070",
"lastModified": "2023-04-28T12:58:13.110",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Docker Desktop for Windows before 4.6.0 allows attackers to overwrite any file through a symlink attack on the hyperv/create dockerBackendV2 API by controlling the DataFolder parameter for DockerDesktop.vhdx, a similar issue to CVE-2022-31647."
}
],
"metrics": {},
"references": [
{
"url": "https://docs.docker.com/desktop/release-notes/#docker-desktop-460",
"source": "cve@mitre.org"
},
{
"url": "https://www.cyberark.com/resources/threat-research-blog/breaking-docker-named-pipes-systematically-docker-desktop-privilege-escalation-part-2",
"source": "cve@mitre.org"
}
]
}