diff options
Diffstat (limited to 'posts/Docker-Image-root-User-Hard-Coded-Credential-Vulnerability.md')
| -rw-r--r-- | posts/Docker-Image-root-User-Hard-Coded-Credential-Vulnerability.md | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/posts/Docker-Image-root-User-Hard-Coded-Credential-Vulnerability.md b/posts/Docker-Image-root-User-Hard-Coded-Credential-Vulnerability.md index 75e6a94..fd6ff1f 100644 --- a/posts/Docker-Image-root-User-Hard-Coded-Credential-Vulnerability.md +++ b/posts/Docker-Image-root-User-Hard-Coded-Credential-Vulnerability.md @@ -1,16 +1,16 @@ --- -title: 'Docker Image root Credential Vulnerability - CVE-2019-5021' +title: 'Docker Image Vulnerability - CVE-2019-5021' date: 2019-05-09 --- -# Docker Image root User Credential Vulnerability - CVE-2019-5021 +# Docker Image Vulnerability (CVE-2019-5021) [CVE-2019-5021](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5021) ## What is the problem? If you have `shadow` package installed in your Docker container and run your -service as non-root an attacker who compromised your system via unrelated +service as non-root an attacker who compromised your system via an unrelated security vulnerabillity, or a user with shell access, could elevate the privileges to root within the container. |
