Docker proof of concept command execution exploit that leverages runc.
d839ae3cbe28eac31921153401a56b44bcb7aa9e71186e649af207b24a2573d0
This Metasploit module leverages a flaw in runc to escape a Docker container and get command execution on the host as root. This vulnerability is identified as CVE-2019-5736. It overwrites the runc binary with the payload and waits for someone to use docker exec to get into the container. This will trigger the payload execution. Note that executing this exploit carries important risks regarding the Docker installation integrity on the target and inside the container.
cccb41227aca832e89e9a6f586e66617bdec002e1dded9d5addd44548302edb1
Gentoo Linux Security Advisory 202003-21 - Multiple vulnerabilities have been discovered in runC, the worst of which may lead to privilege escalation. Versions less than 1.0.0_rc10 are affected.
b654f470c0bc3ea5e9d17a7e1065315ea14d4f317417da2d5c835cd169d7bb2b
Red Hat Security Advisory 2019-0975-01 - The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. Issues addressed include a runc binary overwrite vulnerability.
361971a901acb2e5cf0317a4e5d2151265c70d089dbf99e7b20cc0f66d6a31cf
Red Hat Security Advisory 2019-0408-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include a file descriptor handling issue in runc.
f242eb1bc1a662c6c05d8031be82a78052768334224c021465f22ec8423fba33
Red Hat Security Advisory 2019-0401-01 - Red Hat Container Development Kit is a platform for developing containerized applications; a set of tools that enables developers to quickly and easily set up an environment for developing and testing containerized applications on the Red Hat Enterprise Linux platform. This update, Container Development Kit 3.7.0-1, includes an updated Red Hat Enterprise Linux ISO that contains fixes for the following security issues. Issues addressed include the execution of malicious containers.
759d2adf071aeaf6478fd33f86e690edde93f3c811abd79b79d7deb90e41debf
VMware Security Advisory 2019-0001 - VMware product updates resolve a mishandled file descriptor vulnerability in the runc container runtime.
182b2d347dd43689d08de951414f38dec6cbfee1283ab2a56d93675d7c162451
This is exploit code for CVE-2019-5736 (and it works for both runc and LXC). The simplest way to use it is to copy the exploit code into an existing container, and run make.sh. However, you could just as easily create a bad image and run that. This affects runc versions prior to 1.0-rc6 (Docket versions less than 18.09.2).
e01e406be8b1999dde189059f1ddaad10d163445cf54c9c979d58d3168afb1f2
runc versions prior to 1.0-rc6 (Docker < 18.09.2 host command execution proof of concept exploit.
58916ca55bef8e91b57754a95171d834f060a1120be8c793a1c442c3724d99cb
Red Hat Security Advisory 2019-0304-01 - Docker is an open-source engine that automates the deployment of any application as a lightweight, portable, self-sufficient container that runs virtually anywhere. Issues addressed include an overwrite vulnerability.
581a1305c7a081ecdf9695e54daa99bafd4246f49cec1a80ccaefbf6eb34bbd8
Red Hat Security Advisory 2019-0303-01 - The runC tool is a lightweight, portable implementation of the Open Container Format that provides container runtime. Issues addressed include an overwrite vulnerability.
aaa2d1b7c5e79ab037789efaa9ce871476609fd4528b344eaff16402594e3064