Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-25365 PoC — Docker Desktop安全漏洞

Source
Associated Vulnerability
Title:Docker Desktop安全漏洞 (CVE-2022-25365)
Description:Docker Desktop是美国Docker公司的一个基于容器技术的用于轻量化部署应用的桌面软件。该产品可提供桌面环境可支持在Linux/Windows/Mac OS系统上创建一个容器(轻量级虚拟机)并部署和运行应用程序,以及通过配置文件实现应用程序的自动化安装、部署和升级。 Docker Desktop存在安全漏洞,该漏洞允许攻击者可利用该漏洞移动任意文件。
Readme
# CVE-2022-25365
# The privilege escalation vulnerability in Docker Desktop for Windows
reference: https://www.cyberark.com/resources/threat-research-blog/breaking-docker-named-pipes-systematically-docker-desktop-privilege-escalation-part-1<br>

# File list
poc.py Coded by followboy1999<br>
createsymlink.exe Coded by James Forshaw<br>
junction64.exe Coded by Mark Russinovich<br>
ualapi.dll come from https://github.com/ionescu007/faxhell

File Snapshot

[4.0K] /data/pocs/552c6a9f01029ea739d9b34e46b90a3736d8533a ├── [126K] CreateSymlink.exe ├── [438K] junction64.exe ├── [2.5K] poc.py └── [ 442] README.md 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.