CVE-2019-13139

Summary

CVECVE-2019-13139
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2019-08-22 20:15:00 UTC
Updated2020-08-24 17:37:00 UTC
DescriptionIn Docker before 18.09.4, an attacker who is capable of supplying or manipulating the build path for the "docker build" command would be able to gain command execution. An issue exists in the way "docker build" processes remote git URLs, and results in command injection into the underlying "git clone" command, leading to code execution in the context of the user executing the "docker build" command. This occurs because git ref can be misinterpreted as a flag.

Risk And Classification

Problem Types: CWE-78

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Application Docker Docker All All All All
Application Docker Docker All All All All

References

ReferenceSourceLinkTags
gitutils: add validation for ref by andrewhsu · Pull Request #38944 · moby/moby · GitHub MISC github.com Patch, Third Party Advisory
Bugtraq: [SECURITY] [DSA 4521-1] docker.io security update BUGTRAQ seclists.org
Debian -- Security Information -- DSA-4521-1 docker.io DEBIAN www.debian.org
Docker Engine release notes | Docker Documentation MISC docs.docker.com Release Notes, Vendor Advisory
Red Hat Customer Portal - Access to 24x7 support and knowledge REDHAT access.redhat.com
CVE-2019-13139 - Docker build code execution · Staaldraad MISC staaldraad.github.io Exploit, Third Party Advisory
CVE-2019-13139 Docker Vulnerability in NetApp Products | NetApp Product Security CONFIRM security.netapp.com
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Legacy QID Mappings

  • 353055 Amazon Linux Security Advisory for docker : ALAS2NITRO-ENCLAVES-2021-003
  • 353068 Amazon Linux Security Advisory for docker : ALAS2DOCKER-2021-003
  • 900005 CBL-Mariner Linux Security Update for moby-buildx 0.4.1
  • 902969 Common Base Linux Mariner (CBL-Mariner) Security Update for moby-buildx (4421)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report