Docker before 1.3.3 does not properly validate image IDs, which allows remote attackers to conduct path traversal attacks and spoof repositories via a crafted image in a (1) "docker load" operation or (2) "registry communications."
| Package (Ecosystem) | Introduced | Fixed | Limit |
|---|---|---|---|
| github.com/docker/docker(Go) | 0 | 1.3.2 | N/A |
CVSS Metrics