vendor:
None
by:
Aleksa Sarai
8.6
CVSS
HIGH
Privilege Escalation
269
CWE
Product Name: None
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: YES
Related CWE: CVE-2019-5736
CPE: None
Metasploit:
https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2020-14298/, https://www.rapid7.com/db/vulnerabilities/redhat_linux-cve-2020-14298/, https://www.rapid7.com/db/vulnerabilities/oracle_linux-elsa-2019-4756/, https://www.rapid7.com/db/vulnerabilities/docker-cve-2019-5736/, https://www.rapid7.com/db/vulnerabilities/redhat_linux-cve-2019-5736/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp5-cve-2019-5736/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp2-cve-2019-5736/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2019-5736/, https://www.rapid7.com/db/vulnerabilities/docker_ee-cve-2019-5736/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2019-5736/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2019-5736/, https://www.rapid7.com/db/vulnerabilities/oracle_linux-cve-2019-5736/, https://www.rapid7.com/db/vulnerabilities/redhat-openshift-cve-2019-5736/, https://www.rapid7.com/db/vulnerabilities/alma_linux-cve-2019-5736/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2019-5736/, https://www.rapid7.com/db/vulnerabilities/amazon_linux-cve-2019-5736/, https://www.rapid7.com/db/modules/exploit/linux/local/docker_runc_escape/
Other Scripts:
N/A
Platforms Tested: Linux
2019
CVE-2019-5736
This exploit code allows for a malicious script to execute with root privileges on the host. The exploit code is copied into an existing container and run using the make.sh script. The malicious script is then able to overwrite the host runc binary, allowing for root-level code execution on the host.
Mitigation:
Ensure that all containers are running the latest version of runc and that all images are from trusted sources.