Arbitrary Code Execution Vulnerability in Apache Mesos by Docker Image Manipulation
CVE-2019-0204
7.8HIGH
Summary
A vulnerability exists in certain versions of Apache Mesos that allows a malicious actor to exploit a crafted Docker image running as the root user. By overwriting the init helper binary of the container runtime or the command executor, an attacker can achieve root-level code execution on the host system. This represents a significant security risk as it may allow further compromise of the environment and access to sensitive information.
Affected Version(s)
Apache Mesos pre-1.4.x
Apache Mesos 1.4.0 to 1.4.2
Apache Mesos 1.5.0 to 1.5.2
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved