Vulnerabilities
Vulnerable Software
Redhat:  >> Source-To-Image  Security Vulnerabilities
Openshift Enterprise source-to-image before version 1.1.10 is vulnerable to an improper validation of user input. An attacker who could trick a user into using the command to copy files locally, from a pod, could override files outside of the target directory of the command.
CVSS Score
6.1
EPSS Score
0.003
Published
2018-06-12


Contact Us

Shodan ® - All rights reserved