Docker before 1.3.2 allows remote attackers to write to arbitrary files and execute arbitrary code via a (1) symlink or (2) hard link attack in an image archive in a (a) pull or (b) load operation.
{
"github_reviewed_at": "2021-05-20T21:03:55Z",
"cwe_ids": [
"CWE-59"
],
"nvd_published_at": null,
"github_reviewed": true,
"severity": "HIGH"
}