Home / Vulnerability Database / Config files : Remote data from untrusted source
Config files
Config files : Remote data from untrusted source
Classification
OWASP Top 10 2021
CWE/SANS Top 25 2011
Overview
Some Dockerfile commands involve fetching and executing scripts from remote sources within a Dockerfile, which is potentially a malicious practice.
curl, for example, is used to download a shell script from the internet and then pipe it directly into the shell for execution.
Since the content of the script is executed without review, it could potentially contain malicious code that can harm your system or compromise your data.
The ADD command in a Dockerfile is used to copy files or directories from remote URLs into the container, and if the remote URL is compromised or controlled by an attacker, they can change the content of the file being downloaded. This can be followed by the execution of a malicious code inside the container.
MEDIUM
DerScanner Severity Score
Do you want to fix Config files : Remote data from untrusted source in your application?
See also
Config files
Config files : Text4Shell Vulnerability
Config files
Config files : Incorrect directory deletion
Config files
