flast101 / docker-privesc

Privilege escalation in Docker

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Abusing Docker Configuration: Privesc Script

Read full article: https://flast101.github.io/docker-privesc

docs/docker.png

Requirements:

  • Access to a shell on the target with a user that can run Docker.
  • The target should have either an internet connection or an image installed in Docker. Use docker images to check and change the "alpine" image accordingly. If there is no image go to https://hub.docker.com to get one (tar.gz file with its Dockerfile) and upload it on the target in your working directory.

Usage example:

privesc.png

Mitigation

By default, the process is run as root in the container:

nomitig.png

Applying the mitigation, we can get rid of this problem. The user "dockremap" is now running the process:

mitig.png

Be Curious, Learning is Life ! 😃