logo

418 Insecure service configuration - Docker


Description

Using the ADD command to automatically extract files to the destination directory adds the risk of exploiting vulnerabilities such as zip bombs and Zip Slip that could then be activated automatically.


Impact

Expose the system to zip-based vulnerabilities


Recommendation

Avoid the use of the ADD command unless you need extract a local tar file. Instead, use the COPY command


Threat

Authenticated local attacker with access to the container


Expected Remediation Time

20 minutes.


Score 4.0

Default score using CVSS 4.0. It may change depending on the context of the src.

Base 4.0

  • Attack vector: L
  • Attack complexity: H
  • Attack Requirements: N
  • Privileges required: L
  • User interaction: N
  • Confidentiality (VC): N
  • Integrity (VI): L
  • Availability (VA): N
  • Confidentiality (SC): N
  • Integrity (SI): N
  • Availability (SA): N

Threat 4.0

  • Exploit maturity: P

Requirements


Fixes


Last updated

2024/02/21