docker-privesc
docker-privesc copied to clipboard
Privilege escalation in Docker
Abusing Docker Configuration: Privesc Script
Read full article: https://flast101.github.io/docker-privesc

Requirements:
- Access to a shell on the target with a user that can run Docker.
- The target should have either an internet connection or an image installed in Docker. Use
docker imagesto check and change the "alpine" image accordingly. If there is no image go to https://hub.docker.com to get one (tar.gz file with its Dockerfile) and upload it on the target in your working directory.
Usage example:

Mitigation
By default, the process is run as root in the container:

Applying the mitigation, we can get rid of this problem. The user "dockremap" is now running the process:

Be Curious, Learning is Life ! :smiley: