CVE-2014-5277

Docker before 1.3.1 and docker-py before 0.5.3 fall back to HTTP when the HTTPS connection to the registry fails, which allows man-in-the-middle attackers to conduct downgrade attacks and obtain authentication and image data by leveraging a network position between the client and the registry to block HTTPS traffic.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:docker:docker:*:*:*:*:*:*:*:*
cpe:2.3:a:docker:docker-py:*:*:*:*:*:*:*:*

History

07 Nov 2023, 02:20

Type Values Removed Values Added
References
  • {'url': 'https://groups.google.com/forum/#!topic/docker-user/oYm0i3xShJU', 'name': 'https://groups.google.com/forum/#!topic/docker-user/oYm0i3xShJU', 'tags': [], 'refsource': 'CONFIRM'}
  • () https://groups.google.com/forum/#%21topic/docker-user/oYm0i3xShJU -

Information

Published : 2014-11-17 16:59

Updated : 2023-12-10 11:31


NVD link : CVE-2014-5277

Mitre link : CVE-2014-5277

CVE.ORG link : CVE-2014-5277


JSON object : View

Products Affected

docker

  • docker-py
  • docker
CWE
CWE-17

DEPRECATED: Code