CVE-2014-5277 – docker-py
Package
Manager: pip
Name: docker-py
Vulnerable Version: =0.0.4 || =0.0.5 || =0.0.6 || =0.1.0 || =0.1.1 || =0.1.2 || =0.1.3 || =0.1.4 || =0.1.5 || =0.2.0 || =0.2.1 || =0.2.2 || =0.2.3 || =0.3.0 || =0.3.1 || =0.3.2 || =0.4.0 || =0.5.0 || =0.5.1 || =0.5.2 || >=0 <0.5.3
Severity
Level: Low
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00699 pctl0.7108
Details
Docker before 1.3.1 and docker-py before 0.5.3 fall back to HTTP when the HTTPS connection to the registry fails, which allows man-in-the-middle attackers to conduct downgrade attacks and obtain authentication and image data by leveraging a network position between the client and the registry to block HTTPS traffic.
Metadata
Created: 2014-11-17T16:59:00Z
Modified: 2024-08-21T15:26:43.035056Z
Source: https://osv-vulnerabilities
CWE IDs: N/A
Alternative ID: N/A
Finding: F096
Auto approve: 1