CVE-2019-13509

HIGH

Docker < 18.09.8 - Log Information Exposure

Title source: rule
STIX 2.1

Description

In Docker CE and EE before 18.09.8 (as well as Docker EE before 17.06.2-ee-23 and 18.x before 18.03.1-ee-10), Docker Engine in debug mode may sometimes add secrets to the debug log. This applies to a scenario where docker stack deploy is run to redeploy a stack that includes (non external) secrets. It potentially applies to other API users of the stack API if they resend the secret.

References (8)

Core 8
Core References
Release Notes, Vendor Advisory x_refsource_misc
https://docs.docker.com/engine/release-notes/
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/109253
Vendor Advisory x_refsource_confirm
https://security.netapp.com/advisory/ntap-20190828-0003/
Third Party Advisory vendor-advisory x_refsource_debian
https://www.debian.org/security/2019/dsa-4521
Mailing List mailing-list x_refsource_bugtraq
https://seclists.org/bugtraq/2019/Sep/21

Scores

CVSS v3 7.5
EPSS 0.0152
EPSS Percentile 81.3%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Details

CWE
CWE-532
Status published
Products (6)
docker/docker 17.03.2 1 (8 CPE variants)
docker/docker 17.06.2 1 (21 CPE variants)
docker/docker 18.03.1 1 (9 CPE variants)
docker/docker < 18.09.8
docker/docker 0 - 18.09.8Go
docker/docker 18.09.0 - 18.09.8
Published Jul 18, 2019
Tracked Since Feb 18, 2026