Bug 2023449 (CVE-2021-41092)

Summary: CVE-2021-41092 docker: cli leaks private registry credentials to registry-1.docker.io
Product: [Other] Security Response Reporter: Michael Kaplan <mkaplan>
Component: vulnerabilityAssignee: Nobody <nobody>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: amurdaca, bbennett, bdettelb, bmontgom, caswilli, crarobin, dwalsh, eparis, fdeutsch, fdupont, fjansen, ggastald, gparvin, jburrell, jlanford, jmadigan, kaycoth, krizza, lsm5, ngough, nstielau, pahickey, pamccart, rfreiman, sbiarozk, sponnaga, stcannon, vkumar, xiyuan
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: docker-cli 20.10.9 Doc Type: If docs needed, set a value
Doc Text:
A confidential data leak vulnerability was found in Docker CLI. The execution of `docker login` to a private registry may send provided credentials in a misconfigured docker credentials store to the registry-1.docker.io rather than the specified private registry. This flaw allows an attacker to steal private registry credentials. The highest threat from this vulnerability is to confidentiality.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2025487, 2025489    
Bug Blocks: 2023450    

Description Michael Kaplan 2021-11-15 18:16:17 UTC
A bug was found in the Docker CLI where running `docker login my-private-registry.example.com` with a misconfigured configuration file (typically `~/.docker/config.json`) listing a `credsStore` or `credHelpers` that could not be executed would result in any provided credentials being sent to `registry-1.docker.io` rather than the intended private registry. This bug has been fixed in Docker CLI 20.10.9. Users should update to this version as soon as possible. For users unable to update ensure that any configured credsStore or credHelpers entries in the configuration file reference an installed credential helper that is executable and on the PATH.

References:

https://github.com/docker/cli/commit/893e52cf4ba4b048d72e99748e0f86b2767c6c6b
https://github.com/docker/cli/security/advisories/GHSA-99pg-grm5-qq3v