POC详情: f987a27b5ecabdd623c112f3fd3ba857f5ee42b8

来源
关联漏洞
标题: Docker 代码注入漏洞 (CVE-2019-14271)
描述:Docker是美国Docker公司的一款开源的应用容器引擎。该产品支持在Linux系统上创建一个容器(轻量级虚拟机)并部署和运行应用程序,以及通过配置文件实现应用程序的自动化安装、部署和升级。 Docker中存在安全漏洞。攻击者可利用该漏洞绕过限制,提升权限。
描述
A convenient and time-saving auto script of building environment and exploit it.
介绍
# CVE-2019-14271_Exploit
A convenient and time-saving auto script of building environment and exploit it.

# References
https://github.com/Metarget/metarget

https://github.com/Metarget/metarget/tree/master/writeups_cnv/docker-cve-2019-14271

https://github.com/thomasyang1207/Exploits/tree/master/CVE_2019_14271

# Usage
```bash
chmod 777 Exploit.sh
chmod 777 Install_env.sh
sudo ./Install_env.sh
sudo ./Exploit.sh
```
> If the image has been built, run `Exploit.sh` only for reuse.

Now you have entered the container `cve-14271` and see:
```bash
root@d9b5a334a0e9:/# ls
bin         breakout  home     lib32   logs   opt   run   sys  var
boot        dev       host_fs  lib64   media  proc  sbin  tmp
break_logs  etc       lib      libx32  mnt    root  srv   usr
```

Enter `host_fs` and you will find the host's root directory has been mounted here and you escape successfully. You can act as a root user in the host machine.
文件快照

[4.0K] /data/pocs/f987a27b5ecabdd623c112f3fd3ba857f5ee42b8 ├── [4.0K] exp │   ├── [ 334] breakout │   ├── [ 298] Dockerfile │   ├── [391K] libnss_files.so.2 │   └── [ 46K] original_libnss_files.so.2 ├── [ 414] Exploit.sh ├── [ 364] Install_env.sh ├── [ 11K] LICENSE └── [ 928] README.md 1 directory, 8 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。