In Docker Desktop 4.17.x the Artifactory Integration falls back to sending registry credentials over plain HTTP if the HTTPS health check has failed. A targeted network sniffing attack can lead to a disclosure of sensitive information. Only users who have Access Experimental Features enabled and have logged in to a private registry are affected.
References
Link | Resource |
---|---|
https://docs.docker.com/desktop/release-notes/#4180 | Release Notes |
https://github.com/docker/for-win/issues/13344 | Exploit |
https://docs.docker.com/desktop/release-notes/#4180 | Release Notes |
https://github.com/docker/for-win/issues/13344 | Exploit |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:39
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.9 |
References | () https://docs.docker.com/desktop/release-notes/#4180 - Release Notes | |
References | () https://github.com/docker/for-win/issues/13344 - Exploit |
17 Apr 2023, 17:17
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-04-06 09:15
Updated : 2024-11-21 07:39
NVD link : CVE-2023-1802
Mitre link : CVE-2023-1802
CVE.ORG link : CVE-2023-1802
JSON object : View
Products Affected
docker
- desktop
CWE
CWE-319
Cleartext Transmission of Sensitive Information