Docker before 1.3.3 does not properly validate image IDs, which allows remote attackers to conduct path traversal attacks and spoof repositories via a crafted image in a (1) "docker load" operation or (2) "registry communications."
{
"severity": "MODERATE",
"cwe_ids": [
"CWE-59"
],
"nvd_published_at": null,
"github_reviewed_at": "2021-05-20T21:02:14Z",
"github_reviewed": true
}