Docker before 1.3.2 allows remote attackers to write to arbitrary files and execute arbitrary code via a (1) symlink or (2) hard link attack in an image archive in a (a) pull or (b) load operation.
{ "nvd_published_at": null, "cwe_ids": [ "CWE-59" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2021-05-20T21:03:55Z" }