The vulnerability in the Dockerfile of the Nullify Platform CLI tool represents a moderate security risk. Running containers as root can potentially lead to container escape situations, which could compromise the security of the host system and the data processed by the CLI tool.
Key findings:
Platform Impact: Affects the Infrastructure, with potential impacts on confidentiality and integrity through software configuration access.
Tenant Impact: Potentially affects many tenants using the CLI tool, but impact is limited to individual instances.
Data Impact: Mainly affects confidential data, including internal data and potentially customer scan results.
Severity Threshold: 🔵 MEDIUM
1 Potential vulnerability sources found within this repo
🔴 CRITICAL
🟡 HIGH
🔵 MEDIUM
⚪ LOW
ID: 01J9HD5ESXCWR9YC73AA2H0T97
Language: Containerfile
Severity: 🟡 HIGH
AVD-DS-0002
Image user should not be 'root'
The vulnerability in the Dockerfile of the Nullify Platform CLI tool represents a moderate security risk. Running containers as root can potentially lead to container escape situations, which could compromise the security of the host system and the data processed by the CLI tool.
Key findings:
The vulnerability's impact is mitigated by the nature of the CLI tool, which is not a continuously running service, limiting the window of opportunity for exploitation. Read more: https://avd.aquasec.com/misconfig/ds002 https://github.com/Nullify-Platform/cli/blob/f53da7943fa8924a1ce378f9648155eb6d98cd1b/Dockerfile#L1
Reply with
/nullify
to interact with me like another developer