A POC on how to exploit CVE-2022-27518 # CVE-2022-27518_POC
```bash
docker pull quay.io/citrix/citrix-k8s-cpx-ingress:13.0-58.30
```
Use the following command to verify if CPX image is installed in docker images
```bash
docker images | grep 'citrix-k8s-cpx-ingress'
```
Use the following command to create a CPX container instance running in bridge mode
```bash
docker run --rm -dt -P --privileged=true -e EULA=yes --ulimit core=-1 --name cpx-hello-world quay.io/citrix/citrix-k8s-cpx-ingress:13.0-58.30
```
Once CPX container is deployed successfully, the following command can be used to access the Shell of CPX container
```bash
docker exec -it cpx-hello-world bash
```
[4.0K] /data/pocs/169f6ef9a2cbeb34b2199b10d7ea97c19b0c6273
└── [ 635] README.md
0 directories, 1 file