This Metasploit module leverages a flaw in runc to escape a Docker container and get command execution on the host as root. This vulnerability is identified as CVE-2019-5736. It overwrites the runc binary with the payload and waits for someone to use docker exec to get into the container. This will trigger the payload execution. Note that executing this exploit carries important risks regarding the Docker installation integrity on the target and inside the container.
cccb41227aca832e89e9a6f586e66617bdec002e1dded9d5addd44548302edb1
This Metasploit module exploits a command execution in Pi-Hole versions 4.4 and below. A new blocklist is added, and then an update is forced (gravity) to pull in the blocklist content. PHP content is then written to a file within the webroot. Phase 1 writes a sudo pihole command to launch teleporter, effectively running a privilege escalation. Phase 2 writes our payload to teleporter.php, overwriting the content. Lastly, the phase 1 PHP file is called in the web root, which launches our payload in teleporter.php with root privileges.
e9e23eb75325d3d113b4298300162d67296d9023cbe19ae5f2709a0a7cace534
Pi-hole versions 4.4 and below remote code execution and privilege escalation exploit.
24dbec0272280c917c4f6f1294f5d251879231087642729ccdd7a1b727a27cff
Pi-hole versions 4.4 and below suffer from a remote code execution vulnerability.
c400406dcb79630cf4da18e7a41e5e507d3715a4c57d6150947c2924a9d53b97