repomanz Posted January 14, 2019 Share Posted January 14, 2019 Hey guys - wanted you to be aware of this one. Hot off the press today. https://www.cyberark.com/threat-research-blog/how-i-hacked-play-with-docker-and-remotely-ran-code-on-the-host/ repo Quote Link to comment
Squid Posted January 14, 2019 Share Posted January 14, 2019 Doesn't look like it will work on unRaid root@4280bb0534ed:/# cat /proc/cmdline BOOT_IMAGE=/bzimage initrd=/bzroot No UUID listed so you won't be able to mount it within the container. Quote Link to comment
repomanz Posted January 14, 2019 Author Share Posted January 14, 2019 2 minutes ago, Squid said: Doesn't look like it will work on unRaid root@4280bb0534ed:/# cat /proc/cmdline BOOT_IMAGE=/bzimage initrd=/bzroot No UUID listed so you won't be able to mount it within the container. I don't run any privileged docker containers but would that change if the container was actually ran as privileged? What's interesting is that team is aware of other exploit techniques they chose not to make public. Quote Link to comment
Squid Posted January 14, 2019 Share Posted January 14, 2019 Just now, repomanz said: I don't run any privileged docker containers but would that change if the container was actually ran as privileged? What's interesting is that team is aware of other exploit techniques they chose not to make public. That was a privileged container I posted Quote Link to comment
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.