If a user has sudo permissions to /usr/bin/docker, it can be leveraged to escalated privileges to root.
Whitepaper called Linux Exploit Development Part 2 (rev 2) - Real app demo. It demonstrates the techniques discussed in part two of the Linux Exploit Writing Tutorial Part 2.
© 2024 Packet Storm. All rights reserved.
If a user has sudo permissions to /usr/bin/docker, it can be leveraged to escalated privileges to root.