| { |
| "schema_version": "1.3.1", |
| "id": "GO-2024-2659", |
| "modified": "0001-01-01T00:00:00Z", |
| "published": "0001-01-01T00:00:00Z", |
| "aliases": [ |
| "CVE-2024-29018", |
| "GHSA-mq39-4gv4-mvpx" |
| ], |
| "summary": "Data exfiltration from internal networks in github.com/docker/docker", |
| "details": "dockerd forwards DNS requests to the host loopback device, bypassing the container network namespace's normal routing semantics, networks marked as 'internal' can unexpectedly forward DNS requests to an external nameserver. By registering a domain for which they control the authoritative nameservers, an attacker could arrange for a compromised container to exfiltrate data by encoding it in DNS queries that will eventually be answered by their nameservers.", |
| "affected": [ |
| { |
| "package": { |
| "name": "github.com/docker/docker", |
| "ecosystem": "Go" |
| }, |
| "ranges": [ |
| { |
| "type": "SEMVER", |
| "events": [ |
| { |
| "introduced": "25.0.0+incompatible" |
| }, |
| { |
| "fixed": "25.0.5+incompatible" |
| }, |
| { |
| "introduced": "26.0.0-rc1+incompatible" |
| }, |
| { |
| "fixed": "26.0.0-rc3+incompatible" |
| } |
| ] |
| } |
| ], |
| "ecosystem_specific": {} |
| } |
| ], |
| "references": [ |
| { |
| "type": "ADVISORY", |
| "url": "https://github.com/moby/moby/security/advisories/GHSA-mq39-4gv4-mvpx" |
| }, |
| { |
| "type": "WEB", |
| "url": "https://github.com/moby/moby/pull/46609" |
| } |
| ], |
| "credits": [ |
| { |
| "name": "@robmry" |
| }, |
| { |
| "name": "@akerouanton" |
| }, |
| { |
| "name": "@neersighted" |
| }, |
| { |
| "name": "@gabriellavengeo" |
| } |
| ], |
| "database_specific": { |
| "url": "https://pkg.go.dev/vuln/GO-2024-2659", |
| "review_status": "REVIEWED" |
| } |
| } |