module
Docker Container Escape Via runC Overwrite
| Disclosed |
|---|
| Jan 1, 2019 |
Disclosed
Jan 1, 2019
Description
This module leverages a flaw in `runc` to escape a Docker container
and get command execution on the host as root. This vulnerability is
identified as CVE-2019-5736. It overwrites the `runc` binary with the
payload and wait for someone to use `docker exec` to get into the
container. This will trigger the payload execution.
Note that executing this exploit carries important risks regarding
the Docker installation integrity on the target and inside the
container ('Side Effects' section in the documentation).
and get command execution on the host as root. This vulnerability is
identified as CVE-2019-5736. It overwrites the `runc` binary with the
payload and wait for someone to use `docker exec` to get into the
container. This will trigger the payload execution.
Note that executing this exploit carries important risks regarding
the Docker installation integrity on the target and inside the
container ('Side Effects' section in the documentation).
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.