From 01e088a08d6c118d5b280cddd3b47668cc8a8e8b Mon Sep 17 00:00:00 2001 From: Natanael Copa Date: Thu, 9 May 2019 12:18:32 +0200 Subject: posts/docker image vuln: shorten title, fix grammar --- posts/Docker-Image-root-User-Hard-Coded-Credential-Vulnerability.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) (limited to 'posts') diff --git a/posts/Docker-Image-root-User-Hard-Coded-Credential-Vulnerability.md b/posts/Docker-Image-root-User-Hard-Coded-Credential-Vulnerability.md index 75e6a94..fd6ff1f 100644 --- a/posts/Docker-Image-root-User-Hard-Coded-Credential-Vulnerability.md +++ b/posts/Docker-Image-root-User-Hard-Coded-Credential-Vulnerability.md @@ -1,16 +1,16 @@ --- -title: 'Docker Image root Credential Vulnerability - CVE-2019-5021' +title: 'Docker Image Vulnerability - CVE-2019-5021' date: 2019-05-09 --- -# Docker Image root User Credential Vulnerability - CVE-2019-5021 +# Docker Image Vulnerability (CVE-2019-5021) [CVE-2019-5021](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5021) ## What is the problem? If you have `shadow` package installed in your Docker container and run your -service as non-root an attacker who compromised your system via unrelated +service as non-root an attacker who compromised your system via an unrelated security vulnerabillity, or a user with shell access, could elevate the privileges to root within the container. -- cgit v1.2.3