FKIE_CVE-2019-13509

Vulnerability from fkie_nvd - Published: 2019-07-18 16:15 - Updated: 2024-11-21 04:25
Summary
In Docker CE and EE before 18.09.8 (as well as Docker EE before 17.06.2-ee-23 and 18.x before 18.03.1-ee-10), Docker Engine in debug mode may sometimes add secrets to the debug log. This applies to a scenario where docker stack deploy is run to redeploy a stack that includes (non external) secrets. It potentially applies to other API users of the stack API if they resend the secret.
References
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2019-08/msg00084.html
cve@mitre.orghttp://www.securityfocus.com/bid/109253Third Party Advisory, VDB Entry
cve@mitre.orghttps://docs.docker.com/engine/release-notes/Release Notes, Vendor Advisory
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N674WD3OBDPHLWY6EABRHQH5ON6SUJBU/
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PFFBVE7O73TAVY2BCWXSA2OOSLJVCPXC/
cve@mitre.orghttps://seclists.org/bugtraq/2019/Sep/21
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20190828-0003/
cve@mitre.orghttps://www.debian.org/security/2019/dsa-4521
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00084.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/109253Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://docs.docker.com/engine/release-notes/Release Notes, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N674WD3OBDPHLWY6EABRHQH5ON6SUJBU/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PFFBVE7O73TAVY2BCWXSA2OOSLJVCPXC/
af854a3a-2127-422b-91ae-364da2661108https://seclists.org/bugtraq/2019/Sep/21
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20190828-0003/
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2019/dsa-4521
Impacted products
Vendor Product Version
docker docker *
docker docker 17.03.2
docker docker 17.03.2
docker docker 17.03.2
docker docker 17.03.2
docker docker 17.03.2
docker docker 17.03.2
docker docker 17.03.2
docker docker 17.03.2
docker docker 17.06.2
docker docker 17.06.2
docker docker 17.06.2
docker docker 17.06.2
docker docker 17.06.2
docker docker 17.06.2
docker docker 17.06.2
docker docker 17.06.2
docker docker 17.06.2
docker docker 17.06.2
docker docker 17.06.2
docker docker 17.06.2
docker docker 17.06.2
docker docker 17.06.2
docker docker 17.06.2
docker docker 17.06.2
docker docker 17.06.2
docker docker 17.06.2
docker docker 17.06.2
docker docker 17.06.2
docker docker 17.06.2
docker docker 18.03.1
docker docker 18.03.1
docker docker 18.03.1
docker docker 18.03.1
docker docker 18.03.1
docker docker 18.03.1
docker docker 18.03.1
docker docker 18.03.1
docker docker 18.03.1
docker docker *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:docker:docker:*:*:*:*:enterprise:*:*:*",
              "matchCriteriaId": "4D022DE6-8533-4360-8F03-B210E63B31AB",
              "versionEndExcluding": "18.09.8",
              "versionStartIncluding": "18.09.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:docker:docker:17.03.2:1:*:*:enterprise:*:*:*",
              "matchCriteriaId": "3A35124F-EC46-4CFC-A2A2-893AC0063AF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:docker:docker:17.03.2:2:*:*:enterprise:*:*:*",
              "matchCriteriaId": "2C1A46D9-A718-4944-8A51-AA576665A3AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:docker:docker:17.03.2:3:*:*:enterprise:*:*:*",
              "matchCriteriaId": "343474A5-E102-4DC1-B11E-F7EB93B8BD34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:docker:docker:17.03.2:4:*:*:enterprise:*:*:*",
              "matchCriteriaId": "DF245918-BDC1-4DF8-AEDA-752B4530F634",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:docker:docker:17.03.2:5:*:*:enterprise:*:*:*",
              "matchCriteriaId": "97E72881-8988-4931-AA78-1E998D03A37B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:docker:docker:17.03.2:6:*:*:enterprise:*:*:*",
              "matchCriteriaId": "5ADC31D5-B913-428A-9F7A-5E85349FC5CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:docker:docker:17.03.2:7:*:*:enterprise:*:*:*",
              "matchCriteriaId": "C48F0193-894D-4B64-8301-884EBB1DDE8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:docker:docker:17.03.2:8:*:*:enterprise:*:*:*",
              "matchCriteriaId": "4D2262C9-231A-4978-88EF-B59267B5F5CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:docker:docker:17.06.2:1:*:*:enterprise:*:*:*",
              "matchCriteriaId": "E03D470E-5C28-4935-8ECA-62EED8629889",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:docker:docker:17.06.2:10:*:*:enterprise:*:*:*",
              "matchCriteriaId": "032171DB-4D2A-4691-95E2-DC5791DE1F9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:docker:docker:17.06.2:11:*:*:enterprise:*:*:*",
              "matchCriteriaId": "92852E25-5EE1-477F-BAB9-735DA676F950",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:docker:docker:17.06.2:12:*:*:enterprise:*:*:*",
              "matchCriteriaId": "86BD817A-3BED-46A1-A047-6531D495F05C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:docker:docker:17.06.2:13:*:*:enterprise:*:*:*",
              "matchCriteriaId": "AC6A6285-12CC-4591-B722-AA5943915696",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:docker:docker:17.06.2:15:*:*:enterprise:*:*:*",
              "matchCriteriaId": "0B487089-A678-4306-AF75-DBC792A23BCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:docker:docker:17.06.2:16:*:*:enterprise:*:*:*",
              "matchCriteriaId": "45FEBF98-DE0E-4F78-B9A4-7BCB9F4202C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:docker:docker:17.06.2:17:*:*:enterprise:*:*:*",
              "matchCriteriaId": "26D5DFE0-ED60-448B-92C7-4A06611755AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:docker:docker:17.06.2:18:*:*:enterprise:*:*:*",
              "matchCriteriaId": "296CC9ED-9AF2-41AE-93CF-4B8C94CE7743",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:docker:docker:17.06.2:19:*:*:enterprise:*:*:*",
              "matchCriteriaId": "0178061A-1909-4E39-BF20-3BFD9E8BF22B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:docker:docker:17.06.2:2:*:*:enterprise:*:*:*",
              "matchCriteriaId": "444A75C4-8331-46B3-A056-C4944DF3D792",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:docker:docker:17.06.2:20:*:*:enterprise:*:*:*",
              "matchCriteriaId": "EAF2CFD3-63EB-4DBC-B7A0-BA8858F51F29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:docker:docker:17.06.2:21:*:*:enterprise:*:*:*",
              "matchCriteriaId": "4CAEE8A8-337B-406B-9AF0-2538D54F1514",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:docker:docker:17.06.2:22:*:*:enterprise:*:*:*",
              "matchCriteriaId": "E5CBCA34-6BC1-4069-A12D-78DCA5F06BFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:docker:docker:17.06.2:3:*:*:enterprise:*:*:*",
              "matchCriteriaId": "43BA9F49-85B3-47BD-ABA5-08A234EEDFBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:docker:docker:17.06.2:4:*:*:enterprise:*:*:*",
              "matchCriteriaId": "FBE59DD2-4AD2-4FC9-B5B0-2DD2E4DA219E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:docker:docker:17.06.2:5:*:*:enterprise:*:*:*",
              "matchCriteriaId": "D613D8B1-3608-40B5-ACDA-D0EC0B152F9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:docker:docker:17.06.2:6:*:*:enterprise:*:*:*",
              "matchCriteriaId": "1B9A48AB-A032-4911-928F-6D86B86FB847",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:docker:docker:17.06.2:7:*:*:enterprise:*:*:*",
              "matchCriteriaId": "3A86A73A-CAEC-483A-8C42-D1EC88B1A848",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:docker:docker:17.06.2:8:*:*:enterprise:*:*:*",
              "matchCriteriaId": "8CB75426-B766-48EC-A681-A82747737276",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:docker:docker:17.06.2:9:*:*:enterprise:*:*:*",
              "matchCriteriaId": "42195FEA-1D74-42B2-9212-DF162E0470AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:docker:docker:18.03.1:1:*:*:enterprise:*:*:*",
              "matchCriteriaId": "53935883-E828-40A7-83F4-7218542A401C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:docker:docker:18.03.1:2:*:*:enterprise:*:*:*",
              "matchCriteriaId": "FB720999-4540-487B-9133-32C85026836B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:docker:docker:18.03.1:3:*:*:enterprise:*:*:*",
              "matchCriteriaId": "CBEA8855-C9FE-4301-ADAF-993874DDF7F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:docker:docker:18.03.1:4:*:*:enterprise:*:*:*",
              "matchCriteriaId": "353070E6-89AD-40C4-9A45-AF993DE52BF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:docker:docker:18.03.1:5:*:*:enterprise:*:*:*",
              "matchCriteriaId": "D4541E93-762A-40DF-B596-A5F359049C0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:docker:docker:18.03.1:6:*:*:enterprise:*:*:*",
              "matchCriteriaId": "987118D7-6803-4E11-A184-34FC82E9AF1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:docker:docker:18.03.1:7:*:*:enterprise:*:*:*",
              "matchCriteriaId": "97EFE5E1-6623-44A6-8AA7-A7E30955B513",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:docker:docker:18.03.1:8:*:*:enterprise:*:*:*",
              "matchCriteriaId": "BF61D0BA-5F95-4E92-8D81-5BE5FA59FF61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:docker:docker:18.03.1:9:*:*:enterprise:*:*:*",
              "matchCriteriaId": "DD629561-32BD-4C9D-A38B-063554DCA827",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:docker:docker:*:*:*:*:community:*:*:*",
              "matchCriteriaId": "82A26E20-E07A-4229-907C-2FAF03AD50A3",
              "versionEndExcluding": "18.09.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Docker CE and EE before 18.09.8 (as well as Docker EE before 17.06.2-ee-23 and 18.x before 18.03.1-ee-10), Docker Engine in debug mode may sometimes add secrets to the debug log. This applies to a scenario where docker stack deploy is run to redeploy a stack that includes (non external) secrets. It potentially applies to other API users of the stack API if they resend the secret."
    },
    {
      "lang": "es",
      "value": "En Docker CE y EE antes de 18.09.8 (as\u00ed como en Docker EE antes de 17.06.2-ee-23 y 18.x antes de 18.03.1-ee-10), Docker Engine en modo de depuraci\u00f3n a veces puede agregar secretos al registro de depuraci\u00f3n. . Esto se aplica a un escenario en el que la implementaci\u00f3n de la pila de la ventana acoplable se ejecuta para volver a implementar una pila que incluye secretos (no externos). Potencialmente se aplica a otros usuarios de API de la API de pila si reenv\u00edan el secreto."
    }
  ],
  "id": "CVE-2019-13509",
  "lastModified": "2024-11-21T04:25:02.213",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-07-18T16:15:11.953",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00084.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/109253"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://docs.docker.com/engine/release-notes/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N674WD3OBDPHLWY6EABRHQH5ON6SUJBU/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PFFBVE7O73TAVY2BCWXSA2OOSLJVCPXC/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://seclists.org/bugtraq/2019/Sep/21"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://security.netapp.com/advisory/ntap-20190828-0003/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.debian.org/security/2019/dsa-4521"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00084.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/109253"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://docs.docker.com/engine/release-notes/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N674WD3OBDPHLWY6EABRHQH5ON6SUJBU/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PFFBVE7O73TAVY2BCWXSA2OOSLJVCPXC/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://seclists.org/bugtraq/2019/Sep/21"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.netapp.com/advisory/ntap-20190828-0003/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.debian.org/security/2019/dsa-4521"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-532"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…