Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2019-5736
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Docker 操作系统命令注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Docker是美国Docker公司的一款开源的应用容器引擎。该产品支持在Linux系统上创建一个容器(轻量级虚拟机)并部署和运行应用程序,以及通过配置文件实现应用程序的自动化安装、部署和升级。 Docker 18.09.2之前版本和其他产品中的runc 1.0-rc6及之前版本中存在安全漏洞,该漏洞源于程序没有正确地处理文件描述符。攻击者可利用该漏洞覆盖主机runc的二进制文件并以root权限执行命令。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2019-5736
#POC DescriptionSource LinkShenlong Link
1Unweaponized Proof of Concept for CVE-2019-5736 (Docker escape)https://github.com/q3k/cve-2019-5736-pocPOC Details
2PoC for CVE-2019-5736https://github.com/Frichetten/CVE-2019-5736-PoCPOC Details
3runc容器逃逸漏洞预警https://github.com/jas502n/CVE-2019-5736POC Details
4Nonehttps://github.com/likescam/CVE-2019-5736POC Details
5Nonehttps://github.com/likescam/cve-2019-5736-pocPOC Details
6getshell testhttps://github.com/agppp/cve-2019-5736-pocPOC Details
7Nonehttps://github.com/b3d3c/poc-cve-2019-5736POC Details
8CVE-2019-5736 POCshttps://github.com/twistlock/RunC-CVE-2019-5736POC Details
9Nonehttps://github.com/yyqs2008/CVE-2019-5736-PoC-2POC Details
10https://nvd.nist.gov/vuln/detail/CVE-2019-5736 poc of CVE-2019-5736 https://github.com/zyriuse75/CVE-2019-5736-PoCPOC Details
11Nonehttps://github.com/stillan00b/CVE-2019-5736POC Details
12Exploit for the CVE-2019-5736 runc vulnerabilityhttps://github.com/milloni/cve-2019-5736-expPOC Details
13Docker runc CVE-2019-5736 exploit Dockerfile. Credits : https://github.com/Frichetten/CVE-2019-5736-PoC.githttps://github.com/panzouh/Docker-Runc-ExploitPOC Details
14Proof of concept code for breaking out of docker via runChttps://github.com/RyanNgWH/CVE-2019-5736-POCPOC Details
15Nonehttps://github.com/Lee-SungYoung/cve-2019-5736-studyPOC Details
16Nonehttps://github.com/chosam2/cve-2019-5736-pocPOC Details
17Code sample for using exploit CVE-2019-5736 to mine bitcoin with no association to original container or user.https://github.com/epsteina16/Docker-Escape-MinerPOC Details
18Nonehttps://github.com/geropl/CVE-2019-5736POC Details
19CVE-2019-5736 implemented in a self-written container runtime to understand the exploit.https://github.com/GiverOfGifts/CVE-2019-5736-Custom-RuntimePOC Details
20Nonehttps://github.com/Billith/CVE-2019-5736-PoCPOC Details
21Nonehttps://github.com/BBRathnayaka/POC-CVE-2019-5736POC Details
22CVE-2019-5736https://github.com/shen54/IT19172088POC Details
23Nonehttps://github.com/crypticdante/CVE-2019-5736POC Details
24Modified version of CVE-2019-5736-PoC by Frichettenhttps://github.com/fahmifj/Docker-breakout-runcPOC Details
25Nonehttps://github.com/Asbatel/CVE-2019-5736_POCPOC Details
26Nonehttps://github.com/takumak/cve-2019-5736-reproducerPOC Details
27Nonehttps://github.com/si1ent-le/CVE-2019-5736POC Details
28Nonehttps://github.com/H3xL00m/CVE-2019-5736POC Details
29Nonehttps://github.com/n3ov4n1sh/CVE-2019-5736POC Details
30Nonehttps://github.com/c0d3cr4f73r/CVE-2019-5736POC Details
31Nonehttps://github.com/Sp3c73rSh4d0w/CVE-2019-5736POC Details
32Nonehttps://github.com/0xwh1pl4sh/CVE-2019-5736POC Details
33Nonehttps://github.com/N3rdyN3xus/CVE-2019-5736POC Details
34Nonehttps://github.com/NyxByt3/CVE-2019-5736POC Details
35Nonehttps://github.com/likekabin/CVE-2019-5736POC Details
36Nonehttps://github.com/likekabin/cve-2019-5736-pocPOC Details
37Nonehttps://github.com/h3xcr4ck3r/CVE-2019-5736POC Details
38Nonehttps://github.com/n3rdh4x0r/CVE-2019-5736POC Details
39Description of the Project goes herehttps://github.com/sonyavalo/CVE-2019-5736-attack-and-security-mechanismPOC Details
40In this project, we found a recent attack through the malicious container and implemented a security mechanism to stop it.https://github.com/sonyavalo/CVE-2019-5736-Dockerattack-and-security-mechanismPOC Details
41Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/%E4%BA%91%E5%AE%89%E5%85%A8%E6%BC%8F%E6%B4%9E/Docker%20runC%20%E6%BC%8F%E6%B4%9E%E5%AF%BC%E8%87%B4%E5%AE%B9%E5%99%A8%E9%80%83%E9%80%B8%20CVE-2019-5736.mdPOC Details
42Nonehttps://github.com/h3x0v3rl0rd/CVE-2019-5736POC Details
43C-based PoC for CVE-2019-5736https://github.com/Perimora/cve_2019-5736-PoCPOC Details
44Nonehttps://github.com/h-wookie/cve-2019-5736-pocPOC Details
45This repository provides a high-fidelity technical deconstruction and production-ready exploitation suite for CVE-2019-5736. It demonstrates how a root user inside a container can achieve a Host Root Shell by overwriting the host runc binary using an OverlayFS mount and ld.so.preload manipulation.https://github.com/sastraadiwiguna-purpleeliteteaming/Holistic-Deconstruction-of-CVE-2019-5736-POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2019-5736
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2019-5736

No comments yet


Leave a comment