Docker Desktop for Windows before 4.6 allows attackers to...
Moderate severity
Unreviewed
Published
Apr 27, 2023
to the GitHub Advisory Database
•
Updated Apr 4, 2024
Description
Published by the National Vulnerability Database
Apr 27, 2023
Published to the GitHub Advisory Database
Apr 27, 2023
Last updated
Apr 4, 2024
Docker Desktop for Windows before 4.6 allows attackers to overwrite any file through the windowscontainers/start dockerBackendV2 API by controlling the data-root field inside the DaemonJSON field in the WindowsContainerStartRequest class. This allows exploiting a symlink vulnerability in ..\dataRoot\network\files\local-kv.db because of a TOCTOU race condition.
References