Docker before 1.3.2 allows remote attackers to write to arbitrary files and execute arbitrary code via a (1) symlink or (2) hard link attack in an image archive in a (a) pull or (b) load operation.
{
"github_reviewed_at": "2021-05-20T21:03:55Z",
"nvd_published_at": null,
"cwe_ids": [
"CWE-59"
],
"severity": "HIGH",
"github_reviewed": true
}