path
stringlengths
7
151
cwe
stringclasses
371 values
vuln
stringlengths
5
197k
vuln_desc
stringlengths
4
7.39k
severity
stringclasses
5 values
code
stringlengths
0
487k
scanner
stringclasses
7 values
status
stringclasses
3 values
gpt_status
stringclasses
4 values
/base/coldfusion/11u3/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["bash", "-c", "/opt/coldfusion11/cfusion/bin/coldfusion start && tail -f /opt/coldfusion11/cfusion/logs/coldfusion-out.log"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
WORKDIR /opt/coldfusion11 CMD ["bash", "-c", "/opt/coldfusion11/cfusion/bin/coldfusion start && tail -f /opt/coldfusion11/cfusion/logs/coldfusion-out.log"]
SAST
Unverified
True Positive
/base/coldfusion/8.0.1/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["bash", "-c", "/opt/coldfusion8/bin/coldfusion start && tail -f /opt/coldfusion8/logs/cfserver.log"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
WORKDIR /opt/coldfusion8 CMD ["bash", "-c", "/opt/coldfusion8/bin/coldfusion start && tail -f /opt/coldfusion8/logs/cfserver.log"]
SAST
Unverified
True Positive
/base/couchdb/1.6.0/Dockerfile
['CWE-269: Improper Privilege Management']
ENTRYPOINT ["tini", "--", "/docker-entrypoint.sh"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
WORKDIR /var/lib/couchdb ENTRYPOINT ["tini", "--", "/docker-entrypoint.sh"] CMD ["couchdb"]
SAST
Unverified
True Positive
/base/couchdb/1.6.0/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["couchdb"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
ENTRYPOINT ["tini", "--", "/docker-entrypoint.sh"] CMD ["couchdb"]
SAST
Unverified
True Positive
/base/couchdb/2.1.0/Dockerfile
['CWE-269: Improper Privilege Management']
ENTRYPOINT ["/docker-entrypoint.sh"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
EXPOSE 5984 4369 9100 ENTRYPOINT ["/docker-entrypoint.sh"] CMD ["/opt/couchdb/bin/couchdb"]
SAST
Unverified
True Positive
/base/couchdb/2.1.0/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["/opt/couchdb/bin/couchdb"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
ENTRYPOINT ["/docker-entrypoint.sh"] CMD ["/opt/couchdb/bin/couchdb"]
SAST
Unverified
True Positive
/base/couchdb/3.2.1/Dockerfile
['CWE-269: Improper Privilege Management']
ENTRYPOINT ["/docker-entrypoint.sh"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
EXPOSE 5984 4369 9100 ENTRYPOINT ["/docker-entrypoint.sh"] CMD ["/opt/couchdb/bin/couchdb"]
SAST
Unverified
True Positive
/base/couchdb/3.2.1/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["/opt/couchdb/bin/couchdb"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
ENTRYPOINT ["/docker-entrypoint.sh"] CMD ["/opt/couchdb/bin/couchdb"]
SAST
Unverified
True Positive
/base/cups-browsed/2.0.1/Dockerfile
['CWE-269: Improper Privilege Management']
ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
EXPOSE 631/tcp 631/udp ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ] CMD [ "cups-browsed", "--debug" ]
SAST
Unverified
True Positive
/base/cups-browsed/2.0.1/Dockerfile
['CWE-269: Improper Privilege Management']
CMD [ "cups-browsed", "--debug" ]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
EXPOSE 631/tcp 631/udp ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ] CMD [ "cups-browsed", "--debug" ]
SAST
Unverified
True Positive
/base/django/1.11.4/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["/docker-entrypoint.sh"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
WORKDIR /app CMD ["/docker-entrypoint.sh"]
SAST
Unverified
True Positive
/base/dubbo/2.7.3/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["bash", "/docker-entrypoint.sh"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
EXPOSE 8080 CMD ["bash", "/docker-entrypoint.sh"]
SAST
Unverified
True Positive
/base/elasticsearch/1.1.1/Dockerfile
['CWE-269: Improper Privilege Management']
ENTRYPOINT ["/docker-entrypoint.sh"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
EXPOSE 9200 9300 ENTRYPOINT ["/docker-entrypoint.sh"] CMD ["elasticsearch"]
SAST
Unverified
True Positive
/base/elasticsearch/1.1.1/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["elasticsearch"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
ENTRYPOINT ["/docker-entrypoint.sh"] CMD ["elasticsearch"]
SAST
Unverified
True Positive
/base/elasticsearch/1.4.2/Dockerfile
['CWE-269: Improper Privilege Management']
ENTRYPOINT ["/docker-entrypoint.sh"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
EXPOSE 9200 9300 ENTRYPOINT ["/docker-entrypoint.sh"] CMD ["elasticsearch"]
SAST
Unverified
False Positive
/base/elasticsearch/1.4.2/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["elasticsearch"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
ENTRYPOINT ["/docker-entrypoint.sh"] CMD ["elasticsearch"]
SAST
Unverified
True Positive
/base/elasticsearch/1.4.4/Dockerfile
['CWE-269: Improper Privilege Management']
ENTRYPOINT ["/docker-entrypoint.sh"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
EXPOSE 9200 9300 ENTRYPOINT ["/docker-entrypoint.sh"] CMD ["elasticsearch"]
SAST
Unverified
False Positive
/base/elasticsearch/1.4.4/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["elasticsearch"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
ENTRYPOINT ["/docker-entrypoint.sh"] CMD ["elasticsearch"]
SAST
Unverified
True Positive
/base/elasticsearch/1.5.1/Dockerfile
['CWE-269: Improper Privilege Management']
ENTRYPOINT ["/docker-entrypoint.sh"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
EXPOSE 9200 9300 ENTRYPOINT ["/docker-entrypoint.sh"] CMD ["elasticsearch"]
SAST
Unverified
True Positive
/base/elasticsearch/1.5.1/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["elasticsearch"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
ENTRYPOINT ["/docker-entrypoint.sh"] CMD ["elasticsearch"]
SAST
Unverified
True Positive
/base/elasticsearch/1.6.0/Dockerfile
['CWE-269: Improper Privilege Management']
ENTRYPOINT ["/docker-entrypoint.sh"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
EXPOSE 9200 9300 ENTRYPOINT ["/docker-entrypoint.sh"] CMD ["elasticsearch"]
SAST
Unverified
True Positive
/base/elasticsearch/1.6.0/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["elasticsearch"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
ENTRYPOINT ["/docker-entrypoint.sh"] CMD ["elasticsearch"]
SAST
Unverified
True Positive
/base/fastjson/1.2.24/Dockerfile
['CWE-269: Improper Privilege Management']
CMD [ "java", "-Dserver.address=0.0.0.0", "-Dserver.port=8090", "-jar", "/usr/src/fastjsondemo.jar" ]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
EXPOSE 8090 CMD [ "java", "-Dserver.address=0.0.0.0", "-Dserver.port=8090", "-jar", "/usr/src/fastjsondemo.jar" ]
SAST
Unverified
True Positive
/base/fastjson/1.2.45/Dockerfile
['CWE-269: Improper Privilege Management']
CMD [ "java", "-Dserver.address=0.0.0.0", "-Dserver.port=8090", "-jar", "/usr/src/fastjsondemo.jar" ]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
EXPOSE 8090 CMD [ "java", "-Dserver.address=0.0.0.0", "-Dserver.port=8090", "-jar", "/usr/src/fastjsondemo.jar" ]
SAST
Unverified
True Positive
/base/ffmpeg/2.8.4/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["ffmpeg"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
&& rm -rf /usr/src/* CMD ["ffmpeg"]
SAST
Unverified
True Positive
/base/ffmpeg/3.2.4/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["ffmpeg"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
&& rm -rf /usr/src/* CMD ["ffmpeg"]
SAST
Unverified
True Positive
/base/flask/1.1.1/Dockerfile
['CWE-269: Improper Privilege Management']
CMD gunicorn -w 4 -b :8000 -u www-data -g www-data --access-logfile - app:app
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
WORKDIR /app CMD gunicorn -w 4 -b :8000 -u www-data -g www-data --access-logfile - app:app
SAST
Unverified
False Positive
/base/geoserver/2.17.2/Dockerfile
['CWE-269: Improper Privilege Management']
CMD [ "/mnt/geoserver/bin/startup.sh" ]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
ENV JAVA_OPTS="-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=*:5005" CMD [ "/mnt/geoserver/bin/startup.sh" ]
SAST
Unverified
True Positive
/base/geoserver/2.19.1/Dockerfile
['CWE-269: Improper Privilege Management']
CMD [ "/mnt/geoserver/bin/startup.sh" ]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
ENV JAVA_OPTS="-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=*:5005" CMD [ "/mnt/geoserver/bin/startup.sh" ]
SAST
Unverified
True Positive
/base/geoserver/2.22.1/Dockerfile
['CWE-269: Improper Privilege Management']
CMD [ "/mnt/geoserver/bin/startup.sh" ]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
WORKDIR /mnt/geoserver CMD [ "/mnt/geoserver/bin/startup.sh" ]
SAST
Unverified
True Positive
/base/geoserver/2.23.2/Dockerfile
['CWE-269: Improper Privilege Management']
CMD [ "/mnt/geoserver/bin/startup.sh" ]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
ENV JAVA_OPTS="-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=*:5005" CMD [ "/mnt/geoserver/bin/startup.sh" ]
SAST
Unverified
True Positive
/base/git/2.12.2/with-openssh/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["/usr/sbin/sshd", "-D"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
EXPOSE 22 CMD ["/usr/sbin/sshd", "-D"]
SAST
Unverified
True Positive
/base/gitea/1.4.0/Dockerfile
['CWE-269: Improper Privilege Management']
ENTRYPOINT ["/usr/bin/entrypoint"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
ENV GITEA_CUSTOM /data/gitea ENTRYPOINT ["/usr/bin/entrypoint"] CMD ["/bin/s6-svscan", "/etc/s6"] COPY --from=build-env /go/src/code.gitea.io/gitea/docker /
SAST
Unverified
True Positive
/base/gitea/1.4.0/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["/bin/s6-svscan", "/etc/s6"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
ENTRYPOINT ["/usr/bin/entrypoint"] CMD ["/bin/s6-svscan", "/etc/s6"] COPY --from=build-env /go/src/code.gitea.io/gitea/docker / COPY --from=build-env /go/src/code.gitea.io/gitea/gitea /app/gitea/gitea
SAST
Unverified
True Positive
/base/glassfish/4.1/Dockerfile
['CWE-269: Improper Privilege Management']
ENTRYPOINT ["/entrypoint.sh"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
WORKDIR /usr/local/glassfish4 ENTRYPOINT ["/entrypoint.sh"] # verbose causes the process to remain in the foreground so that docker can track it CMD ["asadmin", "start-domain", "--debug=true", "--verbose"]
SAST
Unverified
True Positive
/base/glassfish/4.1/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["asadmin", "start-domain", "--debug=true", "--verbose"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
# verbose causes the process to remain in the foreground so that docker can track it CMD ["asadmin", "start-domain", "--debug=true", "--verbose"]
SAST
Unverified
True Positive
/base/glassfish/5.1/Dockerfile
['CWE-269: Improper Privilege Management']
ENTRYPOINT ["/entrypoint.sh"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
WORKDIR /usr/local/glassfish5 ENTRYPOINT ["/entrypoint.sh"] # verbose causes the process to remain in the foreground so that docker can track it CMD ["asadmin", "start-domain", "--debug=true", "--verbose"]
SAST
Unverified
True Positive
/base/glassfish/5.1/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["asadmin", "start-domain", "--debug=true", "--verbose"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
# verbose causes the process to remain in the foreground so that docker can track it CMD ["asadmin", "start-domain", "--debug=true", "--verbose"]
SAST
Unverified
True Positive
/base/goahead/3.6.4/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["goahead", "-v", "--home", "/etc/goahead", "/var/www/goahead"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
&& sed -e 's!^route uri=/cgi-bin dir=cgi-bin handler=cgi$!route uri=/cgi-bin dir=/var/www/goahead handler=cgi!' -i /etc/goahead/route.txt CMD ["goahead", "-v", "--home", "/etc/goahead", "/var/www/goahead"]
SAST
Unverified
True Positive
/base/goahead/4.1.2/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["goahead", "-v", "--home", "/etc/goahead", "/var/www/goahead"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
EXPOSE 80 CMD ["goahead", "-v", "--home", "/etc/goahead", "/var/www/goahead"]
SAST
Unverified
True Positive
/base/goahead/5.1.4/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["goahead", "-v", "--home", "/etc/goahead", "/var/www/goahead"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
EXPOSE 80 CMD ["goahead", "-v", "--home", "/etc/goahead", "/var/www/goahead"]
SAST
Unverified
True Positive
/base/httpd/bad-http/Dockerfile
['CWE-269: Improper Privilege Management']
ENTRYPOINT ["/usr/local/bin/docker-entrypoint.sh"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
WORKDIR /var/www/html ENTRYPOINT ["/usr/local/bin/docker-entrypoint.sh"] CMD ["apache2ctl", "-DFOREGROUND"]
SAST
Unverified
True Positive
/base/httpd/bad-http/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["apache2ctl", "-DFOREGROUND"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
ENTRYPOINT ["/usr/local/bin/docker-entrypoint.sh"] CMD ["apache2ctl", "-DFOREGROUND"]
SAST
Unverified
True Positive
/base/jboss/as-4.0.5/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["/opt/jboss/jboss4/bin/run.sh", "-b", "0.0.0.0"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
COPY web-console/* /opt/jboss/jboss4/server/default/deploy/management/console-mgr.sar/web-console.war/WEB-INF/ CMD ["/opt/jboss/jboss4/bin/run.sh", "-b", "0.0.0.0"]
SAST
Unverified
True Positive
/base/jboss/as-6.1.0/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["/run.sh"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
EXPOSE 8080 CMD ["/run.sh"]
SAST
Unverified
True Positive
/base/jeecg-boot/3.5.3/Dockerfile
['CWE-269: Improper Privilege Management']
ENTRYPOINT ["/docker-entrypoint.sh"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
WORKDIR /usr/src ENTRYPOINT ["/docker-entrypoint.sh"] CMD java -Djava.security.egd=file:/dev/./urandom $JAVA_OPTS -jar /usr/src/jeecg-system-start-3.5.3.jar
SAST
Unverified
True Positive
/base/jeecg-boot/3.5.3/Dockerfile
['CWE-269: Improper Privilege Management']
CMD java -Djava.security.egd=file:/dev/./urandom $JAVA_OPTS -jar /usr/src/jeecg-system-start-3.5.3.jar
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
WORKDIR /usr/src ENTRYPOINT ["/docker-entrypoint.sh"] CMD java -Djava.security.egd=file:/dev/./urandom $JAVA_OPTS -jar /usr/src/jeecg-system-start-3.5.3.jar
SAST
Unverified
True Positive
/base/jenkins/2.441/Dockerfile
['CWE-269: Improper Privilege Management']
USER root
The last user in the container is 'root'. This is a security hazard because if an attacker gains control of the container they will have root access. Switch back to another user after running commands as 'root'.
HIGH
ENV JAVA_OPTS="-Djenkins.install.runSetupWizard=false" USER root RUN set -ex \ && sed -i 's/suspend=y/suspend=n/g' /usr/local/bin/jenkins.sh
SAST
Unverified
True Positive
/base/jetty/9.4.37/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["/opt/jetty/bin/jetty.sh", "run"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
WORKDIR ${JETTY_BASE} CMD ["/opt/jetty/bin/jetty.sh", "run"]
SAST
Unverified
True Positive
/base/jetty/9.4.40/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["/opt/jetty/bin/jetty.sh", "run"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
WORKDIR ${JETTY_BASE} CMD ["/opt/jetty/bin/jetty.sh", "run"]
SAST
Unverified
True Positive
/base/jimureport/1.6.0/Dockerfile
['CWE-269: Improper Privilege Management']
ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
WORKDIR /opt/jimureport ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ] CMD [ "java", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=*:5005", "-jar", "/opt/jimureport/jimureport-example-1.6.jar" ]
SAST
Unverified
True Positive
/base/jimureport/1.6.0/Dockerfile
['CWE-269: Improper Privilege Management']
CMD [ "java", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=*:5005", "-jar", "/opt/jimureport/jimureport-example-1.6.jar" ]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
WORKDIR /opt/jimureport ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ] CMD [ "java", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=*:5005", "-jar", "/opt/jimureport/jimureport-example-1.6.jar" ]
SAST
Unverified
True Positive
/base/jmeter/3.3/Dockerfile
['CWE-269: Improper Privilege Management']
CMD /usr/src/apache-jmeter-${JMETER_VERSION}/bin/jmeter-server
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
EXPOSE 1099 CMD /usr/src/apache-jmeter-${JMETER_VERSION}/bin/jmeter-server
SAST
Unverified
True Positive
/base/joomla/3.4.5/Dockerfile
['CWE-269: Improper Privilege Management']
ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
COPY docker-entrypoint.sh /docker-entrypoint.sh COPY .htaccess /var/www/html/.htaccess ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ] CMD ["apache2-foreground"]
SAST
Unverified
True Positive
/base/joomla/3.4.5/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["apache2-foreground"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
COPY .htaccess /var/www/html/.htaccess ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ] CMD ["apache2-foreground"]
SAST
Unverified
True Positive
/base/joomla/3.7.0/Dockerfile
['CWE-269: Improper Privilege Management']
ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
COPY docker-entrypoint.sh /docker-entrypoint.sh COPY .htaccess /var/www/html/.htaccess ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ] CMD ["apache2-foreground"]
SAST
Unverified
True Positive
/base/joomla/3.7.0/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["apache2-foreground"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
COPY .htaccess /var/www/html/.htaccess ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ] CMD ["apache2-foreground"]
SAST
Unverified
True Positive
/base/joomla/4.2.7/Dockerfile
['CWE-269: Improper Privilege Management']
ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
COPY docker-entrypoint.sh /docker-entrypoint.sh COPY .htaccess /var/www/html/.htaccess ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ] CMD ["apache2-foreground"]
SAST
Unverified
True Positive
/base/joomla/4.2.7/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["apache2-foreground"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
COPY .htaccess /var/www/html/.htaccess ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ] CMD ["apache2-foreground"]
SAST
Unverified
True Positive
/base/jumpserver/3.6.3/nginx/default.conf
["CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')"]
proxy_http_version 1.1; proxy_buffering off; proxy_set_header Upgrade $http_upgrade; proxy_set_header Connection "upgrade";
Conditions for Nginx H2C smuggling identified. H2C smuggling allows upgrading HTTP/1.1 connections to lesser-known HTTP/2 over cleartext (h2c) connections which can allow a bypass of reverse proxy access controls, and lead to long-lived, unrestricted HTTP traffic directly to back-end servers. To mitigate: WebSocket support required: Allow only the value websocket for HTTP/1.1 upgrade headers (e.g., Upgrade: websocket). WebSocket support not required: Do not forward Upgrade headers.
MEDIUM
proxy_set_header Host $host; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; proxy_http_version 1.1; proxy_buffering off; proxy_set_header Upgrade $http_upgrade; proxy_set_header Connection "upgrade"; } # lion 配置
SAST
Unverified
True Positive
/base/jumpserver/3.6.3/nginx/default.conf
["CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')"]
proxy_http_version 1.1; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; proxy_set_header Upgrade $http_upgrade; proxy_set_header Connection $http_connection;
Conditions for Nginx H2C smuggling identified. H2C smuggling allows upgrading HTTP/1.1 connections to lesser-known HTTP/2 over cleartext (h2c) connections which can allow a bypass of reverse proxy access controls, and lead to long-lived, unrestricted HTTP traffic directly to back-end servers. To mitigate: WebSocket support required: Allow only the value websocket for HTTP/1.1 upgrade headers (e.g., Upgrade: websocket). WebSocket support not required: Do not forward Upgrade headers.
MEDIUM
proxy_buffering off; proxy_request_buffering off; proxy_http_version 1.1; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; proxy_set_header Upgrade $http_upgrade; proxy_set_header Connection $http_connection; proxy_ignore_client_abort on; proxy_connect_timeout 600; proxy_send_timeout 600;
SAST
Unverified
True Positive
/base/jumpserver/3.6.3/nginx/default.conf
["CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')"]
proxy_http_version 1.1; proxy_set_header Upgrade $http_upgrade; proxy_set_header Connection "upgrade";
Conditions for Nginx H2C smuggling identified. H2C smuggling allows upgrading HTTP/1.1 connections to lesser-known HTTP/2 over cleartext (h2c) connections which can allow a bypass of reverse proxy access controls, and lead to long-lived, unrestricted HTTP traffic directly to back-end servers. To mitigate: WebSocket support required: Allow only the value websocket for HTTP/1.1 upgrade headers (e.g., Upgrade: websocket). WebSocket support not required: Do not forward Upgrade headers.
MEDIUM
proxy_pass http://127.0.0.1:8080; proxy_buffering off; proxy_http_version 1.1; proxy_set_header Upgrade $http_upgrade; proxy_set_header Connection "upgrade"; proxy_set_header X-Real-IP $remote_addr; proxy_set_header Host $host; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
SAST
Unverified
True Positive
/base/jumpserver/3.6.3/nginx/default.conf
["CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')"]
proxy_http_version 1.1; proxy_request_buffering off; proxy_set_header Upgrade $http_upgrade; proxy_set_header Connection "upgrade";
Conditions for Nginx H2C smuggling identified. H2C smuggling allows upgrading HTTP/1.1 connections to lesser-known HTTP/2 over cleartext (h2c) connections which can allow a bypass of reverse proxy access controls, and lead to long-lived, unrestricted HTTP traffic directly to back-end servers. To mitigate: WebSocket support required: Allow only the value websocket for HTTP/1.1 upgrade headers (e.g., Upgrade: websocket). WebSocket support not required: Do not forward Upgrade headers.
MEDIUM
proxy_pass http://127.0.0.1:8082; proxy_buffering off; proxy_http_version 1.1; proxy_request_buffering off; proxy_set_header Upgrade $http_upgrade; proxy_set_header Connection "upgrade"; proxy_set_header X-Real-IP $remote_addr; proxy_set_header Host $host; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
SAST
Unverified
True Positive
/base/jumpserver/3.6.4/nginx/default.conf
["CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')"]
proxy_http_version 1.1; proxy_buffering off; proxy_set_header Upgrade $http_upgrade; proxy_set_header Connection "upgrade";
Conditions for Nginx H2C smuggling identified. H2C smuggling allows upgrading HTTP/1.1 connections to lesser-known HTTP/2 over cleartext (h2c) connections which can allow a bypass of reverse proxy access controls, and lead to long-lived, unrestricted HTTP traffic directly to back-end servers. To mitigate: WebSocket support required: Allow only the value websocket for HTTP/1.1 upgrade headers (e.g., Upgrade: websocket). WebSocket support not required: Do not forward Upgrade headers.
MEDIUM
proxy_set_header Host $host; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; proxy_http_version 1.1; proxy_buffering off; proxy_set_header Upgrade $http_upgrade; proxy_set_header Connection "upgrade"; } # lion 配置
SAST
Unverified
True Positive
/base/jumpserver/3.6.4/nginx/default.conf
["CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')"]
proxy_http_version 1.1; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; proxy_set_header Upgrade $http_upgrade; proxy_set_header Connection $http_connection;
Conditions for Nginx H2C smuggling identified. H2C smuggling allows upgrading HTTP/1.1 connections to lesser-known HTTP/2 over cleartext (h2c) connections which can allow a bypass of reverse proxy access controls, and lead to long-lived, unrestricted HTTP traffic directly to back-end servers. To mitigate: WebSocket support required: Allow only the value websocket for HTTP/1.1 upgrade headers (e.g., Upgrade: websocket). WebSocket support not required: Do not forward Upgrade headers.
MEDIUM
proxy_buffering off; proxy_request_buffering off; proxy_http_version 1.1; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; proxy_set_header Upgrade $http_upgrade; proxy_set_header Connection $http_connection; proxy_ignore_client_abort on; proxy_connect_timeout 600; proxy_send_timeout 600;
SAST
Unverified
True Positive
/base/jumpserver/3.6.4/nginx/default.conf
["CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')"]
proxy_http_version 1.1; proxy_set_header Upgrade $http_upgrade; proxy_set_header Connection "upgrade";
Conditions for Nginx H2C smuggling identified. H2C smuggling allows upgrading HTTP/1.1 connections to lesser-known HTTP/2 over cleartext (h2c) connections which can allow a bypass of reverse proxy access controls, and lead to long-lived, unrestricted HTTP traffic directly to back-end servers. To mitigate: WebSocket support required: Allow only the value websocket for HTTP/1.1 upgrade headers (e.g., Upgrade: websocket). WebSocket support not required: Do not forward Upgrade headers.
MEDIUM
proxy_pass http://127.0.0.1:8080; proxy_buffering off; proxy_http_version 1.1; proxy_set_header Upgrade $http_upgrade; proxy_set_header Connection "upgrade"; proxy_set_header X-Real-IP $remote_addr; proxy_set_header Host $host; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
SAST
Unverified
True Positive
/base/jumpserver/3.6.4/nginx/default.conf
["CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')"]
proxy_http_version 1.1; proxy_request_buffering off; proxy_set_header Upgrade $http_upgrade; proxy_set_header Connection "upgrade";
Conditions for Nginx H2C smuggling identified. H2C smuggling allows upgrading HTTP/1.1 connections to lesser-known HTTP/2 over cleartext (h2c) connections which can allow a bypass of reverse proxy access controls, and lead to long-lived, unrestricted HTTP traffic directly to back-end servers. To mitigate: WebSocket support required: Allow only the value websocket for HTTP/1.1 upgrade headers (e.g., Upgrade: websocket). WebSocket support not required: Do not forward Upgrade headers.
MEDIUM
proxy_pass http://127.0.0.1:8082; proxy_buffering off; proxy_http_version 1.1; proxy_request_buffering off; proxy_set_header Upgrade $http_upgrade; proxy_set_header Connection "upgrade"; proxy_set_header X-Real-IP $remote_addr; proxy_set_header Host $host; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
SAST
Unverified
True Positive
/base/kkfileview/4.3.0/Dockerfile
['CWE-269: Improper Privilege Management']
CMD [ "java", "-Dfile.encoding=UTF-8", "-Dspring.config.location=/opt/kkfileview/config/application.properties", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005", "-jar", "kkFileView-4.3.0.jar" ]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
ENV KKFILEVIEW_BIN_FOLDER /opt/kkfileview/bin WORKDIR /opt/kkfileview/bin CMD [ "java", "-Dfile.encoding=UTF-8", "-Dspring.config.location=/opt/kkfileview/config/application.properties", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005", "-jar", "kkFileView-4.3.0.jar" ]
SAST
Unverified
True Positive
/base/libssh/0.7.4/Dockerfile
['CWE-269: Improper Privilege Management']
CMD [ "/usr/src/build/examples/samplesshd-cb" ]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
&& apt-get purge -y --auto-remove $BUILDDEP CMD [ "/usr/src/build/examples/samplesshd-cb" ]
SAST
Unverified
True Positive
/base/libssh/0.8.1/Dockerfile
['CWE-269: Improper Privilege Management']
CMD /usr/src/build/examples/ssh_server_fork --hostkey=/etc/ssh/ssh_host_rsa_key --ecdsakey=/etc/ssh/ssh_host_ecdsa_key --dsakey=/etc/ssh/ssh_host_dsa_key --rsakey=/etc/ssh/ssh_host_rsa_key -p 22 0.0.0.0
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
&& ssh-keygen -t rsa -b 2048 -f /etc/ssh/ssh_host_rsa_key -q -N "" CMD /usr/src/build/examples/ssh_server_fork --hostkey=/etc/ssh/ssh_host_rsa_key --ecdsakey=/etc/ssh/ssh_host_ecdsa_key --dsakey=/etc/ssh/ssh_host_dsa_key --rsakey=/etc/ssh/ssh_host_rsa_key -p 22 0.0.0.0
SAST
Unverified
True Positive
/base/log4j/2.8.1/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["java", "-jar", "/log4jrce-1.0-SNAPSHOT-all.jar"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
COPY --from=build-env /usr/src/target/log4jrce-1.0-SNAPSHOT-all.jar /log4jrce-1.0-SNAPSHOT-all.jar CMD ["java", "-jar", "/log4jrce-1.0-SNAPSHOT-all.jar"]
SAST
Unverified
True Positive
/base/metersphere/1.15.4/Dockerfile
['CWE-269: Improper Privilege Management']
ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
EXPOSE 5005 8081 ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ] CMD [ "java", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005", "-cp", ".:./lib/*", "io.metersphere.Application" ]
SAST
Unverified
True Positive
/base/metersphere/1.15.4/Dockerfile
['CWE-269: Improper Privilege Management']
CMD [ "java", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005", "-cp", ".:./lib/*", "io.metersphere.Application" ]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
EXPOSE 5005 8081 ENTRYPOINT [ "bash", "/docker-entrypoint.sh" ] CMD [ "java", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005", "-cp", ".:./lib/*", "io.metersphere.Application" ]
SAST
Unverified
True Positive
/base/metersphere/1.16.3/Dockerfile
['CWE-269: Improper Privilege Management']
ENTRYPOINT [ "/docker-entrypoint.sh" ]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
EXPOSE 5005 8081 ENTRYPOINT [ "/docker-entrypoint.sh" ] CMD [ "java", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005", "-cp", ".:./lib/*", "io.metersphere.Application" ]
SAST
Unverified
True Positive
/base/metersphere/1.16.3/Dockerfile
['CWE-269: Improper Privilege Management']
CMD [ "java", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005", "-cp", ".:./lib/*", "io.metersphere.Application" ]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
EXPOSE 5005 8081 ENTRYPOINT [ "/docker-entrypoint.sh" ] CMD [ "java", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005", "-cp", ".:./lib/*", "io.metersphere.Application" ]
SAST
Unverified
True Positive
/base/mini_httpd/1.29/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["mini_httpd", "-p", "8080", "-u", "www-data", "-h", "0.0.0.0", "-d", "/var/www/html", "-D", "-c", "**.cgi", "-l", "/dev/stdout", "-T", "utf-8"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
EXPOSE 8080 CMD ["mini_httpd", "-p", "8080", "-u", "www-data", "-h", "0.0.0.0", "-d", "/var/www/html", "-D", "-c", "**.cgi", "-l", "/dev/stdout", "-T", "utf-8"]
SAST
Unverified
True Positive
/base/minio/2023-02-27T18-10-45Z/Dockerfile
['CWE-269: Improper Privilege Management']
ENTRYPOINT [ "/opt/bin/docker-entrypoint.sh" ]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
EXPOSE 9000 9001 ENTRYPOINT [ "/opt/bin/docker-entrypoint.sh" ] CMD ["minio", "server", "--console-address", ":9001", "/mnt/data"]
SAST
Unverified
True Positive
/base/minio/2023-02-27T18-10-45Z/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["minio", "server", "--console-address", ":9001", "/mnt/data"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
EXPOSE 9000 9001 ENTRYPOINT [ "/opt/bin/docker-entrypoint.sh" ] CMD ["minio", "server", "--console-address", ":9001", "/mnt/data"]
SAST
Unverified
True Positive
/base/mojarra/2.1.28/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["mvn", "jetty:run"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
EXPOSE 8080 WORKDIR /usr/src CMD ["mvn", "jetty:run"]
SAST
Unverified
True Positive
/base/mongo-express/0.53.0/Dockerfile
['CWE-269: Improper Privilege Management']
ENTRYPOINT [ "/docker-entrypoint.sh" ]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
COPY docker-entrypoint.sh / ENTRYPOINT [ "/docker-entrypoint.sh" ] CMD ["mongo-express"]
SAST
Unverified
True Positive
/base/mongo-express/0.53.0/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["mongo-express"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
COPY docker-entrypoint.sh / ENTRYPOINT [ "/docker-entrypoint.sh" ] CMD ["mongo-express"]
SAST
Unverified
True Positive
/base/nacos/1.4.0/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["/opt/nacos/bin/startup.sh", "-m", "standalone"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
EXPOSE 8848 5005 ENV JAVA_OPT "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005" CMD ["/opt/nacos/bin/startup.sh", "-m", "standalone"]
SAST
Unverified
True Positive
/base/nexus/3.14.0/Dockerfile
['CWE-269: Improper Privilege Management']
USER root
The last user in the container is 'root'. This is a security hazard because if an attacker gains control of the container they will have root access. Switch back to another user after running commands as 'root'.
HIGH
LABEL maintainer="phithon <[email protected]>" USER root RUN set -ex \ && sed -i 's/storage\.diskCache\.diskFreeSpaceLimit=4096/storage.diskCache.diskFreeSpaceLimit=512/' /opt/sonatype/nexus/etc/karaf/system.properties \
SAST
Unverified
True Positive
/base/nexus/3.21.1/Dockerfile
['CWE-269: Improper Privilege Management']
USER root
The last user in the container is 'root'. This is a security hazard because if an attacker gains control of the container they will have root access. Switch back to another user after running commands as 'root'.
HIGH
LABEL maintainer="phithon <[email protected]>" USER root RUN set -ex \ && sed -i 's/storage\.diskCache\.diskFreeSpaceLimit=4096/storage.diskCache.diskFreeSpaceLimit=512/' /opt/sonatype/nexus/etc/karaf/system.properties \
SAST
Unverified
True Positive
/base/nexus/3.68.0/Dockerfile
['CWE-269: Improper Privilege Management']
USER root
The last user in the container is 'root'. This is a security hazard because if an attacker gains control of the container they will have root access. Switch back to another user after running commands as 'root'.
HIGH
LABEL maintainer="phithon <[email protected]>" USER root RUN set -ex \ && sed -i 's/storage\.diskCache\.diskFreeSpaceLimit=4096/storage.diskCache.diskFreeSpaceLimit=512/' /opt/sonatype/nexus/etc/karaf/system.properties \
SAST
Unverified
True Positive
/base/ofbiz/17.12.01/Dockerfile
['CWE-269: Improper Privilege Management']
CMD [ "java", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005", "-jar", "./build/libs/ofbiz.jar" ]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
WORKDIR /usr/src/apache-ofbiz EXPOSE 8443 CMD [ "java", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005", "-jar", "./build/libs/ofbiz.jar" ]
SAST
Unverified
True Positive
/base/ofbiz/17.12.05/Dockerfile
['CWE-269: Improper Privilege Management']
CMD [ "java", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005", "-jar", "./build/libs/ofbiz.jar" ]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
WORKDIR /usr/src/apache-ofbiz EXPOSE 8443 CMD [ "java", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005", "-jar", "./build/libs/ofbiz.jar" ]
SAST
Unverified
True Positive
/base/ofbiz/18.12.09/Dockerfile
['CWE-269: Improper Privilege Management']
CMD [ "java", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005", "-jar", "./build/libs/ofbiz.jar" ]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
WORKDIR /usr/src/apache-ofbiz EXPOSE 8443 CMD [ "java", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005", "-jar", "./build/libs/ofbiz.jar" ]
SAST
Unverified
True Positive
/base/ofbiz/18.12.10/Dockerfile
['CWE-269: Improper Privilege Management']
CMD [ "java", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005", "-jar", "./build/libs/ofbiz.jar" ]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
WORKDIR /usr/src/apache-ofbiz EXPOSE 8443 CMD [ "java", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005", "-jar", "./build/libs/ofbiz.jar" ]
SAST
Unverified
True Positive
/base/ofbiz/18.12.14/Dockerfile
['CWE-269: Improper Privilege Management']
CMD [ "java", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005", "-jar", "./build/libs/ofbiz.jar" ]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
WORKDIR /usr/src/apache-ofbiz EXPOSE 8443 CMD [ "java", "-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005", "-jar", "./build/libs/ofbiz.jar" ]
SAST
Unverified
True Positive
/base/openfire/4.7.4/Dockerfile
['CWE-269: Improper Privilege Management']
CMD [ "/mnt/openfire/bin/openfire", "run" ]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
WORKDIR /mnt/openfire CMD [ "/mnt/openfire/bin/openfire", "run" ]
SAST
Unverified
True Positive
/base/opensmtpd/6.6.1p1/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["smtpd", "-dv"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
WORKDIR /tmp EXPOSE 25 CMD ["smtpd", "-dv"]
SAST
Unverified
True Positive
/base/openssh/7.7/Dockerfile
['CWE-269: Improper Privilege Management']
ENTRYPOINT ["/docker-entrypoint.sh"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
EXPOSE 22 ENTRYPOINT ["/docker-entrypoint.sh"] CMD ["/usr/local/sbin/sshd", "-D"]
SAST
Unverified
True Positive
/base/openssh/7.7/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["/usr/local/sbin/sshd", "-D"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
ENTRYPOINT ["/docker-entrypoint.sh"] CMD ["/usr/local/sbin/sshd", "-D"]
SAST
Unverified
True Positive
/base/openssl/1.0.1c/with-nginx/Dockerfile
['CWE-269: Improper Privilege Management']
CMD ["/usr/local/nginx/sbin/nginx", "-c", "/etc/nginx/nginx.conf", "-g", "daemon off;"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
COPY local.crt local.key /etc/ssl/nginx/ COPY nginx.conf /etc/nginx/ CMD ["/usr/local/nginx/sbin/nginx", "-c", "/etc/nginx/nginx.conf", "-g", "daemon off;"]
SAST
Unverified
True Positive
/base/openssl/1.0.1c/with-nginx/local.key
['CWE-798: Use of Hard-coded Credentials']
-----BEGIN PRIVATE KEY----- MIIEvQIBADANBgkqhkiG9w0BAQEFAASCBKcwggSjAgEAAoIBAQDGOAH9yzseDdf4
Private Key detected. This is a sensitive credential and should not be hardcoded here. Instead, store this in a separate, private file.
HIGH
-----BEGIN PRIVATE KEY----- MIIEvQIBADANBgkqhkiG9w0BAQEFAASCBKcwggSjAgEAAoIBAQDGOAH9yzseDdf4 s8gvdKC2rcp/XsPR2wX0UPbPPfP+mft3iSpi8mE+AziAUZw/4SQuYxrtwRnI7LV7 R6Ag6wLSkoiN3vts/4Jp9/OeRN2OVtn2jfgwmOPsEOwbQs7YStP6WaxjmndPqc2z 54VNukRm5vlSrQuYmCLyNMB15c79Ag4R14W0wJ2H+g4KUOE+PDdkfVZLNF6SJLFT
SAST
Unverified
True Positive
/base/openssl/1.0.1c/with-nginx/nginx.conf
['CWE-326: Inadequate Encryption Strength']
ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
Detected use of an insecure SSL version. Secure SSL versions are TLSv1.2 and TLS1.3; older versions are known to be broken and are susceptible to attacks. Prefer use of TLSv1.2 or later.
MEDIUM
client_max_body_size 5m; ssl_protocols TLSv1 TLSv1.1 TLSv1.2; ssl_prefer_server_ciphers on; access_log /var/log/access.log;
SAST
Unverified
True Positive
/base/opentsdb/2.4.0/Dockerfile
['CWE-269: Improper Privilege Management']
ENTRYPOINT ["/docker-entrypoint.sh"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
WORKDIR /usr/share/opentsdb ENTRYPOINT ["/docker-entrypoint.sh"]
SAST
Unverified
True Positive
/base/opentsdb/2.4.1/Dockerfile
['CWE-269: Improper Privilege Management']
ENTRYPOINT ["/docker-entrypoint.sh"]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
WORKDIR /usr/share/opentsdb ENTRYPOINT ["/docker-entrypoint.sh"]
SAST
Unverified
True Positive
/base/pgadmin/6.16/Dockerfile
['CWE-269: Improper Privilege Management']
CMD [ "pgadmin4" ]
By not specifying a USER, a program in the container may run as 'root'. This is a security hazard. If an attacker can control a process running as root, they may have control over the container. Ensure that the last USER in a Dockerfile is a USER other than 'root'.
HIGH
WORKDIR /usr/local/lib/python3.10/site-packages/pgadmin4 CMD [ "pgadmin4" ]
SAST
Unverified
True Positive