module

Docker-Credential-Wincred.exe Privilege Escalation

Disclosed
2019-07-05
Created
2020-04-24

Description

This exploit leverages a vulnerability in docker desktop
community editions prior to 2.1.0.1 where an attacker can write
a payload to a lower-privileged area to be executed
automatically by the docker user at login.

Authors

Morgan Roman
bwatters-r7

Platform

Windows

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use exploit/windows/local/docker_credential_wincred
msf exploit(docker_credential_wincred) > show targets
...targets...
msf exploit(docker_credential_wincred) > set TARGET < target-id >
msf exploit(docker_credential_wincred) > show options
...show and set options...
msf exploit(docker_credential_wincred) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.