Vulnerability Description
Docker before 1.3.1 and docker-py before 0.5.3 fall back to HTTP when the HTTPS connection to the registry fails, which allows man-in-the-middle attackers to conduct downgrade attacks and obtain authentication and image data by leveraging a network position between the client and the registry to block HTTPS traffic.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Docker | Docker | <= 1.3.0 |
| Docker | Docker-Py | <= 0.5.3 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-updates/2014-11/msg00048.html
- https://groups.google.com/forum/#%21topic/docker-user/oYm0i3xShJU
- http://lists.opensuse.org/opensuse-updates/2014-11/msg00048.html
- https://groups.google.com/forum/#%21topic/docker-user/oYm0i3xShJU
FAQ
What is CVE-2014-5277?
CVE-2014-5277 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Docker before 1.3.1 and docker-py before 0.5.3 fall back to HTTP when the HTTPS connection to the registry fails, which allows man-in-the-middle attackers to conduct downgrade attacks and obtain authe...
How severe is CVE-2014-5277?
CVE-2014-5277 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-5277?
Check the references section above for vendor advisories and patch information. Affected products include: Docker Docker, Docker Docker-Py.