path
stringlengths 7
151
| cwe
stringclasses 371
values | vuln
stringlengths 5
197k
| vuln_desc
stringlengths 4
7.39k
| severity
stringclasses 5
values | code
stringlengths 0
487k
| scanner
stringclasses 7
values | status
stringclasses 3
values | gpt_status
stringclasses 4
values |
---|---|---|---|---|---|---|---|---|
/base/coldfusion/11u3/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["bash", "-c", "/opt/coldfusion11/cfusion/bin/coldfusion start && tail -f /opt/coldfusion11/cfusion/logs/coldfusion-out.log"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | WORKDIR /opt/coldfusion11
CMD ["bash", "-c", "/opt/coldfusion11/cfusion/bin/coldfusion start && tail -f /opt/coldfusion11/cfusion/logs/coldfusion-out.log"] | SAST | Unverified | True Positive |
/base/coldfusion/8.0.1/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["bash", "-c", "/opt/coldfusion8/bin/coldfusion start && tail -f /opt/coldfusion8/logs/cfserver.log"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | WORKDIR /opt/coldfusion8
CMD ["bash", "-c", "/opt/coldfusion8/bin/coldfusion start && tail -f /opt/coldfusion8/logs/cfserver.log"] | SAST | Unverified | True Positive |
/base/couchdb/1.6.0/Dockerfile | ['CWE-269: Improper Privilege Management'] | ENTRYPOINT ["tini", "--", "/docker-entrypoint.sh"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | WORKDIR /var/lib/couchdb
ENTRYPOINT ["tini", "--", "/docker-entrypoint.sh"]
CMD ["couchdb"] | SAST | Unverified | True Positive |
/base/couchdb/1.6.0/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["couchdb"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | ENTRYPOINT ["tini", "--", "/docker-entrypoint.sh"]
CMD ["couchdb"] | SAST | Unverified | True Positive |
/base/couchdb/2.1.0/Dockerfile | ['CWE-269: Improper Privilege Management'] | ENTRYPOINT ["/docker-entrypoint.sh"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | EXPOSE 5984 4369 9100
ENTRYPOINT ["/docker-entrypoint.sh"]
CMD ["/opt/couchdb/bin/couchdb"] | SAST | Unverified | True Positive |
/base/couchdb/2.1.0/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["/opt/couchdb/bin/couchdb"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | ENTRYPOINT ["/docker-entrypoint.sh"]
CMD ["/opt/couchdb/bin/couchdb"] | SAST | Unverified | True Positive |
/base/couchdb/3.2.1/Dockerfile | ['CWE-269: Improper Privilege Management'] | ENTRYPOINT ["/docker-entrypoint.sh"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | EXPOSE 5984 4369 9100
ENTRYPOINT ["/docker-entrypoint.sh"]
CMD ["/opt/couchdb/bin/couchdb"] | SAST | Unverified | True Positive |
/base/couchdb/3.2.1/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["/opt/couchdb/bin/couchdb"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | ENTRYPOINT ["/docker-entrypoint.sh"]
CMD ["/opt/couchdb/bin/couchdb"] | SAST | Unverified | True Positive |
/base/cups-browsed/2.0.1/Dockerfile | ['CWE-269: Improper Privilege Management'] | ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | EXPOSE 631/tcp 631/udp
ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ]
CMD [ "cups-browsed", "--debug" ] | SAST | Unverified | True Positive |
/base/cups-browsed/2.0.1/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD [ "cups-browsed", "--debug" ] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | EXPOSE 631/tcp 631/udp
ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ]
CMD [ "cups-browsed", "--debug" ] | SAST | Unverified | True Positive |
/base/django/1.11.4/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["/docker-entrypoint.sh"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | WORKDIR /app
CMD ["/docker-entrypoint.sh"] | SAST | Unverified | True Positive |
/base/dubbo/2.7.3/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["bash", "/docker-entrypoint.sh"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | EXPOSE 8080
CMD ["bash", "/docker-entrypoint.sh"] | SAST | Unverified | True Positive |
/base/elasticsearch/1.1.1/Dockerfile | ['CWE-269: Improper Privilege Management'] | ENTRYPOINT ["/docker-entrypoint.sh"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | EXPOSE 9200 9300
ENTRYPOINT ["/docker-entrypoint.sh"]
CMD ["elasticsearch"] | SAST | Unverified | True Positive |
/base/elasticsearch/1.1.1/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["elasticsearch"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | ENTRYPOINT ["/docker-entrypoint.sh"]
CMD ["elasticsearch"] | SAST | Unverified | True Positive |
/base/elasticsearch/1.4.2/Dockerfile | ['CWE-269: Improper Privilege Management'] | ENTRYPOINT ["/docker-entrypoint.sh"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | EXPOSE 9200 9300
ENTRYPOINT ["/docker-entrypoint.sh"]
CMD ["elasticsearch"] | SAST | Unverified | False Positive |
/base/elasticsearch/1.4.2/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["elasticsearch"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | ENTRYPOINT ["/docker-entrypoint.sh"]
CMD ["elasticsearch"] | SAST | Unverified | True Positive |
/base/elasticsearch/1.4.4/Dockerfile | ['CWE-269: Improper Privilege Management'] | ENTRYPOINT ["/docker-entrypoint.sh"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | EXPOSE 9200 9300
ENTRYPOINT ["/docker-entrypoint.sh"]
CMD ["elasticsearch"] | SAST | Unverified | False Positive |
/base/elasticsearch/1.4.4/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["elasticsearch"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | ENTRYPOINT ["/docker-entrypoint.sh"]
CMD ["elasticsearch"] | SAST | Unverified | True Positive |
/base/elasticsearch/1.5.1/Dockerfile | ['CWE-269: Improper Privilege Management'] | ENTRYPOINT ["/docker-entrypoint.sh"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | EXPOSE 9200 9300
ENTRYPOINT ["/docker-entrypoint.sh"]
CMD ["elasticsearch"] | SAST | Unverified | True Positive |
/base/elasticsearch/1.5.1/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["elasticsearch"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | ENTRYPOINT ["/docker-entrypoint.sh"]
CMD ["elasticsearch"] | SAST | Unverified | True Positive |
/base/elasticsearch/1.6.0/Dockerfile | ['CWE-269: Improper Privilege Management'] | ENTRYPOINT ["/docker-entrypoint.sh"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | EXPOSE 9200 9300
ENTRYPOINT ["/docker-entrypoint.sh"]
CMD ["elasticsearch"] | SAST | Unverified | True Positive |
/base/elasticsearch/1.6.0/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["elasticsearch"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | ENTRYPOINT ["/docker-entrypoint.sh"]
CMD ["elasticsearch"] | SAST | Unverified | True Positive |
/base/fastjson/1.2.24/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD [ "java", "-Dserver.address=0.0.0.0", "-Dserver.port=8090", "-jar", "/usr/src/fastjsondemo.jar" ] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | EXPOSE 8090
CMD [ "java", "-Dserver.address=0.0.0.0", "-Dserver.port=8090", "-jar", "/usr/src/fastjsondemo.jar" ] | SAST | Unverified | True Positive |
/base/fastjson/1.2.45/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD [ "java", "-Dserver.address=0.0.0.0", "-Dserver.port=8090", "-jar", "/usr/src/fastjsondemo.jar" ] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | EXPOSE 8090
CMD [ "java", "-Dserver.address=0.0.0.0", "-Dserver.port=8090", "-jar", "/usr/src/fastjsondemo.jar" ] | SAST | Unverified | True Positive |
/base/ffmpeg/2.8.4/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["ffmpeg"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | && rm -rf /usr/src/*
CMD ["ffmpeg"] | SAST | Unverified | True Positive |
/base/ffmpeg/3.2.4/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["ffmpeg"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | && rm -rf /usr/src/*
CMD ["ffmpeg"] | SAST | Unverified | True Positive |
/base/flask/1.1.1/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD gunicorn -w 4 -b :8000 -u www-data -g www-data --access-logfile - app:app | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | WORKDIR /app
CMD gunicorn -w 4 -b :8000 -u www-data -g www-data --access-logfile - app:app | SAST | Unverified | False Positive |
/base/geoserver/2.17.2/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD [ "/mnt/geoserver/bin/startup.sh" ] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | ENV JAVA_OPTS="-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=*:5005"
CMD [ "/mnt/geoserver/bin/startup.sh" ] | SAST | Unverified | True Positive |
/base/geoserver/2.19.1/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD [ "/mnt/geoserver/bin/startup.sh" ] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | ENV JAVA_OPTS="-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=*:5005"
CMD [ "/mnt/geoserver/bin/startup.sh" ] | SAST | Unverified | True Positive |
/base/geoserver/2.22.1/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD [ "/mnt/geoserver/bin/startup.sh" ] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | WORKDIR /mnt/geoserver
CMD [ "/mnt/geoserver/bin/startup.sh" ] | SAST | Unverified | True Positive |
/base/geoserver/2.23.2/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD [ "/mnt/geoserver/bin/startup.sh" ] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | ENV JAVA_OPTS="-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=*:5005"
CMD [ "/mnt/geoserver/bin/startup.sh" ] | SAST | Unverified | True Positive |
/base/git/2.12.2/with-openssh/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["/usr/sbin/sshd", "-D"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | EXPOSE 22
CMD ["/usr/sbin/sshd", "-D"] | SAST | Unverified | True Positive |
/base/gitea/1.4.0/Dockerfile | ['CWE-269: Improper Privilege Management'] | ENTRYPOINT ["/usr/bin/entrypoint"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | ENV GITEA_CUSTOM /data/gitea
ENTRYPOINT ["/usr/bin/entrypoint"]
CMD ["/bin/s6-svscan", "/etc/s6"]
COPY --from=build-env /go/src/code.gitea.io/gitea/docker / | SAST | Unverified | True Positive |
/base/gitea/1.4.0/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["/bin/s6-svscan", "/etc/s6"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | ENTRYPOINT ["/usr/bin/entrypoint"]
CMD ["/bin/s6-svscan", "/etc/s6"]
COPY --from=build-env /go/src/code.gitea.io/gitea/docker /
COPY --from=build-env /go/src/code.gitea.io/gitea/gitea /app/gitea/gitea | SAST | Unverified | True Positive |
/base/glassfish/4.1/Dockerfile | ['CWE-269: Improper Privilege Management'] | ENTRYPOINT ["/entrypoint.sh"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | WORKDIR /usr/local/glassfish4
ENTRYPOINT ["/entrypoint.sh"]
# verbose causes the process to remain in the foreground so that docker can track it
CMD ["asadmin", "start-domain", "--debug=true", "--verbose"] | SAST | Unverified | True Positive |
/base/glassfish/4.1/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["asadmin", "start-domain", "--debug=true", "--verbose"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | # verbose causes the process to remain in the foreground so that docker can track it
CMD ["asadmin", "start-domain", "--debug=true", "--verbose"] | SAST | Unverified | True Positive |
/base/glassfish/5.1/Dockerfile | ['CWE-269: Improper Privilege Management'] | ENTRYPOINT ["/entrypoint.sh"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | WORKDIR /usr/local/glassfish5
ENTRYPOINT ["/entrypoint.sh"]
# verbose causes the process to remain in the foreground so that docker can track it
CMD ["asadmin", "start-domain", "--debug=true", "--verbose"] | SAST | Unverified | True Positive |
/base/glassfish/5.1/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["asadmin", "start-domain", "--debug=true", "--verbose"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | # verbose causes the process to remain in the foreground so that docker can track it
CMD ["asadmin", "start-domain", "--debug=true", "--verbose"] | SAST | Unverified | True Positive |
/base/goahead/3.6.4/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["goahead", "-v", "--home", "/etc/goahead", "/var/www/goahead"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | && sed -e 's!^route uri=/cgi-bin dir=cgi-bin handler=cgi$!route uri=/cgi-bin dir=/var/www/goahead handler=cgi!' -i /etc/goahead/route.txt
CMD ["goahead", "-v", "--home", "/etc/goahead", "/var/www/goahead"] | SAST | Unverified | True Positive |
/base/goahead/4.1.2/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["goahead", "-v", "--home", "/etc/goahead", "/var/www/goahead"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | EXPOSE 80
CMD ["goahead", "-v", "--home", "/etc/goahead", "/var/www/goahead"] | SAST | Unverified | True Positive |
/base/goahead/5.1.4/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["goahead", "-v", "--home", "/etc/goahead", "/var/www/goahead"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | EXPOSE 80
CMD ["goahead", "-v", "--home", "/etc/goahead", "/var/www/goahead"] | SAST | Unverified | True Positive |
/base/httpd/bad-http/Dockerfile | ['CWE-269: Improper Privilege Management'] | ENTRYPOINT ["/usr/local/bin/docker-entrypoint.sh"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | WORKDIR /var/www/html
ENTRYPOINT ["/usr/local/bin/docker-entrypoint.sh"]
CMD ["apache2ctl", "-DFOREGROUND"] | SAST | Unverified | True Positive |
/base/httpd/bad-http/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["apache2ctl", "-DFOREGROUND"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | ENTRYPOINT ["/usr/local/bin/docker-entrypoint.sh"]
CMD ["apache2ctl", "-DFOREGROUND"] | SAST | Unverified | True Positive |
/base/jboss/as-4.0.5/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["/opt/jboss/jboss4/bin/run.sh", "-b", "0.0.0.0"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | COPY web-console/* /opt/jboss/jboss4/server/default/deploy/management/console-mgr.sar/web-console.war/WEB-INF/
CMD ["/opt/jboss/jboss4/bin/run.sh", "-b", "0.0.0.0"] | SAST | Unverified | True Positive |
/base/jboss/as-6.1.0/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["/run.sh"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | EXPOSE 8080
CMD ["/run.sh"] | SAST | Unverified | True Positive |
/base/jeecg-boot/3.5.3/Dockerfile | ['CWE-269: Improper Privilege Management'] | ENTRYPOINT ["/docker-entrypoint.sh"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | WORKDIR /usr/src
ENTRYPOINT ["/docker-entrypoint.sh"]
CMD java -Djava.security.egd=file:/dev/./urandom $JAVA_OPTS -jar /usr/src/jeecg-system-start-3.5.3.jar | SAST | Unverified | True Positive |
/base/jeecg-boot/3.5.3/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD java -Djava.security.egd=file:/dev/./urandom $JAVA_OPTS -jar /usr/src/jeecg-system-start-3.5.3.jar | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | WORKDIR /usr/src
ENTRYPOINT ["/docker-entrypoint.sh"]
CMD java -Djava.security.egd=file:/dev/./urandom $JAVA_OPTS -jar /usr/src/jeecg-system-start-3.5.3.jar | SAST | Unverified | True Positive |
/base/jenkins/2.441/Dockerfile | ['CWE-269: Improper Privilege Management'] | USER root | The last user in the container is 'root'. This is a security hazard because if an attacker gains control of the container they will have root access. Switch back to another user after running commands as 'root'. | HIGH | ENV JAVA_OPTS="-Djenkins.install.runSetupWizard=false"
USER root
RUN set -ex \
&& sed -i 's/suspend=y/suspend=n/g' /usr/local/bin/jenkins.sh | SAST | Unverified | True Positive |
/base/jetty/9.4.37/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["/opt/jetty/bin/jetty.sh", "run"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | WORKDIR ${JETTY_BASE}
CMD ["/opt/jetty/bin/jetty.sh", "run"] | SAST | Unverified | True Positive |
/base/jetty/9.4.40/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["/opt/jetty/bin/jetty.sh", "run"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | WORKDIR ${JETTY_BASE}
CMD ["/opt/jetty/bin/jetty.sh", "run"] | SAST | Unverified | True Positive |
/base/jimureport/1.6.0/Dockerfile | ['CWE-269: Improper Privilege Management'] | ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | WORKDIR /opt/jimureport
ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ]
CMD [ "java", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=*:5005", "-jar", "/opt/jimureport/jimureport-example-1.6.jar" ] | SAST | Unverified | True Positive |
/base/jimureport/1.6.0/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD [ "java", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=*:5005", "-jar", "/opt/jimureport/jimureport-example-1.6.jar" ] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | WORKDIR /opt/jimureport
ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ]
CMD [ "java", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=*:5005", "-jar", "/opt/jimureport/jimureport-example-1.6.jar" ] | SAST | Unverified | True Positive |
/base/jmeter/3.3/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD /usr/src/apache-jmeter-${JMETER_VERSION}/bin/jmeter-server | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | EXPOSE 1099
CMD /usr/src/apache-jmeter-${JMETER_VERSION}/bin/jmeter-server | SAST | Unverified | True Positive |
/base/joomla/3.4.5/Dockerfile | ['CWE-269: Improper Privilege Management'] | ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | COPY docker-entrypoint.sh /docker-entrypoint.sh
COPY .htaccess /var/www/html/.htaccess
ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ]
CMD ["apache2-foreground"] | SAST | Unverified | True Positive |
/base/joomla/3.4.5/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["apache2-foreground"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | COPY .htaccess /var/www/html/.htaccess
ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ]
CMD ["apache2-foreground"] | SAST | Unverified | True Positive |
/base/joomla/3.7.0/Dockerfile | ['CWE-269: Improper Privilege Management'] | ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | COPY docker-entrypoint.sh /docker-entrypoint.sh
COPY .htaccess /var/www/html/.htaccess
ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ]
CMD ["apache2-foreground"] | SAST | Unverified | True Positive |
/base/joomla/3.7.0/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["apache2-foreground"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | COPY .htaccess /var/www/html/.htaccess
ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ]
CMD ["apache2-foreground"] | SAST | Unverified | True Positive |
/base/joomla/4.2.7/Dockerfile | ['CWE-269: Improper Privilege Management'] | ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | COPY docker-entrypoint.sh /docker-entrypoint.sh
COPY .htaccess /var/www/html/.htaccess
ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ]
CMD ["apache2-foreground"] | SAST | Unverified | True Positive |
/base/joomla/4.2.7/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["apache2-foreground"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | COPY .htaccess /var/www/html/.htaccess
ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ]
CMD ["apache2-foreground"] | SAST | Unverified | True Positive |
/base/jumpserver/3.6.3/nginx/default.conf | ["CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')"] | proxy_http_version 1.1;
proxy_buffering off;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade"; | Conditions for Nginx H2C smuggling identified. H2C smuggling allows upgrading HTTP/1.1 connections to lesser-known HTTP/2 over cleartext (h2c) connections which can allow a bypass of reverse proxy access controls, and lead to long-lived, unrestricted HTTP traffic directly to back-end servers. To mitigate: WebSocket support required: Allow only the value websocket for HTTP/1.1 upgrade headers (e.g., Upgrade: websocket). WebSocket support not required: Do not forward Upgrade headers. | MEDIUM | proxy_set_header Host $host;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_http_version 1.1;
proxy_buffering off;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
}
# lion 配置 | SAST | Unverified | True Positive |
/base/jumpserver/3.6.3/nginx/default.conf | ["CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')"] | proxy_http_version 1.1;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection $http_connection; | Conditions for Nginx H2C smuggling identified. H2C smuggling allows upgrading HTTP/1.1 connections to lesser-known HTTP/2 over cleartext (h2c) connections which can allow a bypass of reverse proxy access controls, and lead to long-lived, unrestricted HTTP traffic directly to back-end servers. To mitigate: WebSocket support required: Allow only the value websocket for HTTP/1.1 upgrade headers (e.g., Upgrade: websocket). WebSocket support not required: Do not forward Upgrade headers. | MEDIUM | proxy_buffering off;
proxy_request_buffering off;
proxy_http_version 1.1;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection $http_connection;
proxy_ignore_client_abort on;
proxy_connect_timeout 600;
proxy_send_timeout 600; | SAST | Unverified | True Positive |
/base/jumpserver/3.6.3/nginx/default.conf | ["CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')"] | proxy_http_version 1.1;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade"; | Conditions for Nginx H2C smuggling identified. H2C smuggling allows upgrading HTTP/1.1 connections to lesser-known HTTP/2 over cleartext (h2c) connections which can allow a bypass of reverse proxy access controls, and lead to long-lived, unrestricted HTTP traffic directly to back-end servers. To mitigate: WebSocket support required: Allow only the value websocket for HTTP/1.1 upgrade headers (e.g., Upgrade: websocket). WebSocket support not required: Do not forward Upgrade headers. | MEDIUM | proxy_pass http://127.0.0.1:8080;
proxy_buffering off;
proxy_http_version 1.1;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header Host $host;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; | SAST | Unverified | True Positive |
/base/jumpserver/3.6.3/nginx/default.conf | ["CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')"] | proxy_http_version 1.1;
proxy_request_buffering off;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade"; | Conditions for Nginx H2C smuggling identified. H2C smuggling allows upgrading HTTP/1.1 connections to lesser-known HTTP/2 over cleartext (h2c) connections which can allow a bypass of reverse proxy access controls, and lead to long-lived, unrestricted HTTP traffic directly to back-end servers. To mitigate: WebSocket support required: Allow only the value websocket for HTTP/1.1 upgrade headers (e.g., Upgrade: websocket). WebSocket support not required: Do not forward Upgrade headers. | MEDIUM | proxy_pass http://127.0.0.1:8082;
proxy_buffering off;
proxy_http_version 1.1;
proxy_request_buffering off;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header Host $host;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; | SAST | Unverified | True Positive |
/base/jumpserver/3.6.4/nginx/default.conf | ["CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')"] | proxy_http_version 1.1;
proxy_buffering off;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade"; | Conditions for Nginx H2C smuggling identified. H2C smuggling allows upgrading HTTP/1.1 connections to lesser-known HTTP/2 over cleartext (h2c) connections which can allow a bypass of reverse proxy access controls, and lead to long-lived, unrestricted HTTP traffic directly to back-end servers. To mitigate: WebSocket support required: Allow only the value websocket for HTTP/1.1 upgrade headers (e.g., Upgrade: websocket). WebSocket support not required: Do not forward Upgrade headers. | MEDIUM | proxy_set_header Host $host;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_http_version 1.1;
proxy_buffering off;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
}
# lion 配置 | SAST | Unverified | True Positive |
/base/jumpserver/3.6.4/nginx/default.conf | ["CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')"] | proxy_http_version 1.1;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection $http_connection; | Conditions for Nginx H2C smuggling identified. H2C smuggling allows upgrading HTTP/1.1 connections to lesser-known HTTP/2 over cleartext (h2c) connections which can allow a bypass of reverse proxy access controls, and lead to long-lived, unrestricted HTTP traffic directly to back-end servers. To mitigate: WebSocket support required: Allow only the value websocket for HTTP/1.1 upgrade headers (e.g., Upgrade: websocket). WebSocket support not required: Do not forward Upgrade headers. | MEDIUM | proxy_buffering off;
proxy_request_buffering off;
proxy_http_version 1.1;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection $http_connection;
proxy_ignore_client_abort on;
proxy_connect_timeout 600;
proxy_send_timeout 600; | SAST | Unverified | True Positive |
/base/jumpserver/3.6.4/nginx/default.conf | ["CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')"] | proxy_http_version 1.1;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade"; | Conditions for Nginx H2C smuggling identified. H2C smuggling allows upgrading HTTP/1.1 connections to lesser-known HTTP/2 over cleartext (h2c) connections which can allow a bypass of reverse proxy access controls, and lead to long-lived, unrestricted HTTP traffic directly to back-end servers. To mitigate: WebSocket support required: Allow only the value websocket for HTTP/1.1 upgrade headers (e.g., Upgrade: websocket). WebSocket support not required: Do not forward Upgrade headers. | MEDIUM | proxy_pass http://127.0.0.1:8080;
proxy_buffering off;
proxy_http_version 1.1;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header Host $host;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; | SAST | Unverified | True Positive |
/base/jumpserver/3.6.4/nginx/default.conf | ["CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')"] | proxy_http_version 1.1;
proxy_request_buffering off;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade"; | Conditions for Nginx H2C smuggling identified. H2C smuggling allows upgrading HTTP/1.1 connections to lesser-known HTTP/2 over cleartext (h2c) connections which can allow a bypass of reverse proxy access controls, and lead to long-lived, unrestricted HTTP traffic directly to back-end servers. To mitigate: WebSocket support required: Allow only the value websocket for HTTP/1.1 upgrade headers (e.g., Upgrade: websocket). WebSocket support not required: Do not forward Upgrade headers. | MEDIUM | proxy_pass http://127.0.0.1:8082;
proxy_buffering off;
proxy_http_version 1.1;
proxy_request_buffering off;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header Host $host;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; | SAST | Unverified | True Positive |
/base/kkfileview/4.3.0/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD [ "java", "-Dfile.encoding=UTF-8", "-Dspring.config.location=/opt/kkfileview/config/application.properties", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005", "-jar", "kkFileView-4.3.0.jar" ] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | ENV KKFILEVIEW_BIN_FOLDER /opt/kkfileview/bin
WORKDIR /opt/kkfileview/bin
CMD [ "java", "-Dfile.encoding=UTF-8", "-Dspring.config.location=/opt/kkfileview/config/application.properties", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005", "-jar", "kkFileView-4.3.0.jar" ] | SAST | Unverified | True Positive |
/base/libssh/0.7.4/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD [ "/usr/src/build/examples/samplesshd-cb" ] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | && apt-get purge -y --auto-remove $BUILDDEP
CMD [ "/usr/src/build/examples/samplesshd-cb" ] | SAST | Unverified | True Positive |
/base/libssh/0.8.1/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD /usr/src/build/examples/ssh_server_fork --hostkey=/etc/ssh/ssh_host_rsa_key --ecdsakey=/etc/ssh/ssh_host_ecdsa_key --dsakey=/etc/ssh/ssh_host_dsa_key --rsakey=/etc/ssh/ssh_host_rsa_key -p 22 0.0.0.0 | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | && ssh-keygen -t rsa -b 2048 -f /etc/ssh/ssh_host_rsa_key -q -N ""
CMD /usr/src/build/examples/ssh_server_fork --hostkey=/etc/ssh/ssh_host_rsa_key --ecdsakey=/etc/ssh/ssh_host_ecdsa_key --dsakey=/etc/ssh/ssh_host_dsa_key --rsakey=/etc/ssh/ssh_host_rsa_key -p 22 0.0.0.0 | SAST | Unverified | True Positive |
/base/log4j/2.8.1/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["java", "-jar", "/log4jrce-1.0-SNAPSHOT-all.jar"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | COPY --from=build-env /usr/src/target/log4jrce-1.0-SNAPSHOT-all.jar /log4jrce-1.0-SNAPSHOT-all.jar
CMD ["java", "-jar", "/log4jrce-1.0-SNAPSHOT-all.jar"] | SAST | Unverified | True Positive |
/base/metersphere/1.15.4/Dockerfile | ['CWE-269: Improper Privilege Management'] | ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | EXPOSE 5005 8081
ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ]
CMD [ "java", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005", "-cp", ".:./lib/*", "io.metersphere.Application" ] | SAST | Unverified | True Positive |
/base/metersphere/1.15.4/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD [ "java", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005", "-cp", ".:./lib/*", "io.metersphere.Application" ] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | EXPOSE 5005 8081
ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ]
CMD [ "java", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005", "-cp", ".:./lib/*", "io.metersphere.Application" ] | SAST | Unverified | True Positive |
/base/metersphere/1.16.3/Dockerfile | ['CWE-269: Improper Privilege Management'] | ENTRYPOINT [ "/docker-entrypoint.sh" ] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | EXPOSE 5005 8081
ENTRYPOINT [ "/docker-entrypoint.sh" ]
CMD [ "java", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005", "-cp", ".:./lib/*", "io.metersphere.Application" ] | SAST | Unverified | True Positive |
/base/metersphere/1.16.3/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD [ "java", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005", "-cp", ".:./lib/*", "io.metersphere.Application" ] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | EXPOSE 5005 8081
ENTRYPOINT [ "/docker-entrypoint.sh" ]
CMD [ "java", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005", "-cp", ".:./lib/*", "io.metersphere.Application" ] | SAST | Unverified | True Positive |
/base/mini_httpd/1.29/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["mini_httpd", "-p", "8080", "-u", "www-data", "-h", "0.0.0.0", "-d", "/var/www/html", "-D", "-c", "**.cgi", "-l", "/dev/stdout", "-T", "utf-8"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | EXPOSE 8080
CMD ["mini_httpd", "-p", "8080", "-u", "www-data", "-h", "0.0.0.0", "-d", "/var/www/html", "-D", "-c", "**.cgi", "-l", "/dev/stdout", "-T", "utf-8"] | SAST | Unverified | True Positive |
/base/minio/2023-02-27T18-10-45Z/Dockerfile | ['CWE-269: Improper Privilege Management'] | ENTRYPOINT [ "/opt/bin/docker-entrypoint.sh" ] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | EXPOSE 9000 9001
ENTRYPOINT [ "/opt/bin/docker-entrypoint.sh" ]
CMD ["minio", "server", "--console-address", ":9001", "/mnt/data"] | SAST | Unverified | True Positive |
/base/minio/2023-02-27T18-10-45Z/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["minio", "server", "--console-address", ":9001", "/mnt/data"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | EXPOSE 9000 9001
ENTRYPOINT [ "/opt/bin/docker-entrypoint.sh" ]
CMD ["minio", "server", "--console-address", ":9001", "/mnt/data"] | SAST | Unverified | True Positive |
/base/mojarra/2.1.28/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["mvn", "jetty:run"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | EXPOSE 8080
WORKDIR /usr/src
CMD ["mvn", "jetty:run"] | SAST | Unverified | True Positive |
/base/mongo-express/0.53.0/Dockerfile | ['CWE-269: Improper Privilege Management'] | ENTRYPOINT [ "/docker-entrypoint.sh" ] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | COPY docker-entrypoint.sh /
ENTRYPOINT [ "/docker-entrypoint.sh" ]
CMD ["mongo-express"] | SAST | Unverified | True Positive |
/base/mongo-express/0.53.0/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["mongo-express"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | COPY docker-entrypoint.sh /
ENTRYPOINT [ "/docker-entrypoint.sh" ]
CMD ["mongo-express"] | SAST | Unverified | True Positive |
/base/nacos/1.4.0/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["/opt/nacos/bin/startup.sh", "-m", "standalone"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | EXPOSE 8848 5005
ENV JAVA_OPT "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005"
CMD ["/opt/nacos/bin/startup.sh", "-m", "standalone"] | SAST | Unverified | True Positive |
/base/nexus/3.14.0/Dockerfile | ['CWE-269: Improper Privilege Management'] | USER root | The last user in the container is 'root'. This is a security hazard because if an attacker gains control of the container they will have root access. Switch back to another user after running commands as 'root'. | HIGH | LABEL maintainer="phithon <[email protected]>"
USER root
RUN set -ex \
&& sed -i 's/storage\.diskCache\.diskFreeSpaceLimit=4096/storage.diskCache.diskFreeSpaceLimit=512/' /opt/sonatype/nexus/etc/karaf/system.properties \ | SAST | Unverified | True Positive |
/base/nexus/3.21.1/Dockerfile | ['CWE-269: Improper Privilege Management'] | USER root | The last user in the container is 'root'. This is a security hazard because if an attacker gains control of the container they will have root access. Switch back to another user after running commands as 'root'. | HIGH | LABEL maintainer="phithon <[email protected]>"
USER root
RUN set -ex \
&& sed -i 's/storage\.diskCache\.diskFreeSpaceLimit=4096/storage.diskCache.diskFreeSpaceLimit=512/' /opt/sonatype/nexus/etc/karaf/system.properties \ | SAST | Unverified | True Positive |
/base/nexus/3.68.0/Dockerfile | ['CWE-269: Improper Privilege Management'] | USER root | The last user in the container is 'root'. This is a security hazard because if an attacker gains control of the container they will have root access. Switch back to another user after running commands as 'root'. | HIGH | LABEL maintainer="phithon <[email protected]>"
USER root
RUN set -ex \
&& sed -i 's/storage\.diskCache\.diskFreeSpaceLimit=4096/storage.diskCache.diskFreeSpaceLimit=512/' /opt/sonatype/nexus/etc/karaf/system.properties \ | SAST | Unverified | True Positive |
/base/ofbiz/17.12.01/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD [ "java", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005", "-jar", "./build/libs/ofbiz.jar" ] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | WORKDIR /usr/src/apache-ofbiz
EXPOSE 8443
CMD [ "java", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005", "-jar", "./build/libs/ofbiz.jar" ] | SAST | Unverified | True Positive |
/base/ofbiz/17.12.05/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD [ "java", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005", "-jar", "./build/libs/ofbiz.jar" ] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | WORKDIR /usr/src/apache-ofbiz
EXPOSE 8443
CMD [ "java", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005", "-jar", "./build/libs/ofbiz.jar" ] | SAST | Unverified | True Positive |
/base/ofbiz/18.12.09/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD [ "java", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005", "-jar", "./build/libs/ofbiz.jar" ] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | WORKDIR /usr/src/apache-ofbiz
EXPOSE 8443
CMD [ "java", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005", "-jar", "./build/libs/ofbiz.jar" ] | SAST | Unverified | True Positive |
/base/ofbiz/18.12.10/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD [ "java", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005", "-jar", "./build/libs/ofbiz.jar" ] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | WORKDIR /usr/src/apache-ofbiz
EXPOSE 8443
CMD [ "java", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005", "-jar", "./build/libs/ofbiz.jar" ] | SAST | Unverified | True Positive |
/base/ofbiz/18.12.14/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD [ "java", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005", "-jar", "./build/libs/ofbiz.jar" ] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | WORKDIR /usr/src/apache-ofbiz
EXPOSE 8443
CMD [ "java", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005", "-jar", "./build/libs/ofbiz.jar" ] | SAST | Unverified | True Positive |
/base/openfire/4.7.4/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD [ "/mnt/openfire/bin/openfire", "run" ] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | WORKDIR /mnt/openfire
CMD [ "/mnt/openfire/bin/openfire", "run" ] | SAST | Unverified | True Positive |
/base/opensmtpd/6.6.1p1/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["smtpd", "-dv"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | WORKDIR /tmp
EXPOSE 25
CMD ["smtpd", "-dv"] | SAST | Unverified | True Positive |
/base/openssh/7.7/Dockerfile | ['CWE-269: Improper Privilege Management'] | ENTRYPOINT ["/docker-entrypoint.sh"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | EXPOSE 22
ENTRYPOINT ["/docker-entrypoint.sh"]
CMD ["/usr/local/sbin/sshd", "-D"] | SAST | Unverified | True Positive |
/base/openssh/7.7/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["/usr/local/sbin/sshd", "-D"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | ENTRYPOINT ["/docker-entrypoint.sh"]
CMD ["/usr/local/sbin/sshd", "-D"] | SAST | Unverified | True Positive |
/base/openssl/1.0.1c/with-nginx/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD ["/usr/local/nginx/sbin/nginx", "-c", "/etc/nginx/nginx.conf", "-g", "daemon off;"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | COPY local.crt local.key /etc/ssl/nginx/
COPY nginx.conf /etc/nginx/
CMD ["/usr/local/nginx/sbin/nginx", "-c", "/etc/nginx/nginx.conf", "-g", "daemon off;"] | SAST | Unverified | True Positive |
/base/openssl/1.0.1c/with-nginx/local.key | ['CWE-798: Use of Hard-coded Credentials'] | -----BEGIN PRIVATE KEY-----
MIIEvQIBADANBgkqhkiG9w0BAQEFAASCBKcwggSjAgEAAoIBAQDGOAH9yzseDdf4 | Private Key detected. This is a sensitive credential and should not be hardcoded here. Instead, store this in a separate, private file. | HIGH | -----BEGIN PRIVATE KEY-----
MIIEvQIBADANBgkqhkiG9w0BAQEFAASCBKcwggSjAgEAAoIBAQDGOAH9yzseDdf4
s8gvdKC2rcp/XsPR2wX0UPbPPfP+mft3iSpi8mE+AziAUZw/4SQuYxrtwRnI7LV7
R6Ag6wLSkoiN3vts/4Jp9/OeRN2OVtn2jfgwmOPsEOwbQs7YStP6WaxjmndPqc2z
54VNukRm5vlSrQuYmCLyNMB15c79Ag4R14W0wJ2H+g4KUOE+PDdkfVZLNF6SJLFT | SAST | Unverified | True Positive |
/base/openssl/1.0.1c/with-nginx/nginx.conf | ['CWE-326: Inadequate Encryption Strength'] | ssl_protocols TLSv1 TLSv1.1 TLSv1.2; | Detected use of an insecure SSL version. Secure SSL versions are TLSv1.2 and TLS1.3; older versions are known to be broken and are susceptible to attacks. Prefer use of TLSv1.2 or later. | MEDIUM | client_max_body_size 5m;
ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
ssl_prefer_server_ciphers on;
access_log /var/log/access.log; | SAST | Unverified | True Positive |
/base/opentsdb/2.4.0/Dockerfile | ['CWE-269: Improper Privilege Management'] | ENTRYPOINT ["/docker-entrypoint.sh"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | WORKDIR /usr/share/opentsdb
ENTRYPOINT ["/docker-entrypoint.sh"] | SAST | Unverified | True Positive |
/base/opentsdb/2.4.1/Dockerfile | ['CWE-269: Improper Privilege Management'] | ENTRYPOINT ["/docker-entrypoint.sh"] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | WORKDIR /usr/share/opentsdb
ENTRYPOINT ["/docker-entrypoint.sh"] | SAST | Unverified | True Positive |
/base/pgadmin/6.16/Dockerfile | ['CWE-269: Improper Privilege Management'] | CMD [ "pgadmin4" ] | By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'. | HIGH | WORKDIR /usr/local/lib/python3.10/site-packages/pgadmin4
CMD [ "pgadmin4" ] | SAST | Unverified | True Positive |
Subsets and Splits