Lucene search

K
zdtFeexd1337DAY-ID-32165
HistoryFeb 12, 2019 - 12:00 a.m.

runC < 1.0-rc6 (Docker < 18.09.2) - Host Command Execution Exploit

2019-02-1200:00:00
feexd
0day.today
77

0.003 Low

EPSS

Percentile

64.0%

Exploit for linux platform in category local exploits

runc< 1.0-rc6 (Docker < 18.09.2) - Host Command Execution

# Usage
Edit HOST inside `payload.c`, compile with `make`. Start `nc` and run `pwn.sh` inside the container.

# Notes
- This exploit is destructive: it'll overwrite `/usr/bin/docker-runc` binary *on the host* with the
payload. It'll also overwrite `/bin/sh` inside the container.
- Tested only on Debian 9.
- No attempts were made to make it stable or reliable, it's only tested to work when a `docker exec
<id> /bin/sh` is issued on the host.

More complete explanation [here](https://github.com/lxc/lxc/commit/6400238d08cdf1ca20d49bafb85f4e224348bf9d).

Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46359.zip


#  0day.today [2019-02-25]  #