CVE-2018-11757

Source
https://nvd.nist.gov/vuln/detail/CVE-2018-11757
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-11757.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2018-11757
Published
2018-07-23T17:29:00.307Z
Modified
2025-11-18T14:00:47.210866Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

In Docker Skeleton Runtime for Apache OpenWhisk, a Docker action inheriting the Docker tag openwhisk/dockerskeleton:1.3.0 (or earlier) may allow an attacker to replace the user function inside the container if the user code is vulnerable to code exploitation.

References

Affected packages

Git

github.com/apache/openwhisk-runtime-docker

Affected ranges

Type
GIT
Repo
https://github.com/apache/openwhisk-runtime-docker
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

dockerskeleton@1.*

dockerskeleton@1.0.0
dockerskeleton@1.1.0
dockerskeleton@1.2.0
dockerskeleton@1.3.0

example@1.*

example@1.0.0

sdk@0.*

sdk@0.1.0

github.com/apache/incubator-openwhisk-runtime-docker

Affected ranges

Type
GIT
Repo
https://github.com/apache/incubator-openwhisk-runtime-docker
Events
Introduced
0 Unknown introduced commit / All previous commits are affected