Subscribe via feed.

Docker Privileged Container Escape

Posted by deepcore on August 7, 2020 – 3:48 am

This Metasploit module escapes from a privileged Docker container and obtains root on the host machine by abusing the Linux cgroup notification on release feature. This exploit should work against any container started with the following flags: –cap-add=SYS_ADMIN, –privileged.


This post is under “exploit” and has no respond so far.
If you enjoy this article, make sure you subscribe to my RSS Feed.

Post a reply

You must be logged in to post a comment.