{"vulnerability": "CVE-2018-15664", "sightings": [{"uuid": "ebddc278-fdf0-457b-a441-ce05faa998ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-15664", "type": "published-proof-of-concept", "source": "https://t.me/tech_b0lt_Genona/553", "content": "CVE-2018-15664: docker (all versions) is vulnerable to a symlink-race attack\nhttps://seclists.org/oss-sec/2019/q2/131", "creation_timestamp": "2019-05-28T15:44:11.000000Z"}, {"uuid": "7c7e3f30-87b8-482f-829d-2615af7e9f5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-15664", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/271", "content": "#exploit\n1. CVE-2020-14976:\nGNS3 ubridge SETUID bit - arbitrary file read\nhttps://theevilbit.github.io/posts/gns3_ubridge_setuid_bit_arbitrary_file_read\n\n2. CVE-2018-15664: \nDocker (all versions) is vulnerable to a symlink-race attack\nhttps://seclists.org/oss-sec/2019/q2/131", "creation_timestamp": "2024-05-06T09:57:50.000000Z"}, {"uuid": "4de90e7d-0664-4add-84c3-d4696f7bcac0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-15664", "type": "seen", "source": "https://t.me/cibsecurity/4473", "content": "ATENTION\u203c New - CVE-2018-15664\n\nIn Docker through 18.06.1-ce-rc2, the API endpoints behind the 'docker cp' command are vulnerable to a symlink-exchange attack with Directory Traversal, giving attackers arbitrary read-write access to the host filesystem with root privileges, because daemon/archive.go does not do archive operations on a frozen filesystem (or from within a chroot).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2019-05-23T18:29:18.000000Z"}]}