Docker Privileged Container Escape
Posted by deepcore on August 7, 2020 – 3:48 am
This Metasploit module escapes from a privileged Docker container and obtains root on the host machine by abusing the Linux cgroup notification on release feature. This exploit should work against any container started with the following flags: –cap-add=SYS_ADMIN, –privileged.
Post a reply
You must be logged in to post a comment.