This Metasploit module leverages a flaw in runc to escape a Docker container and get command execution on the host as root. This vulnerability is identified as CVE-2019-5736. It overwrites the runc binary with the payload and waits for someone to use docker exec to get into the container. This will trigger the payload execution. Note that executing this exploit carries important risks regarding the Docker installation integrity on the target and inside the container.

You May Also Like

XCSSET MacOS malware targets Telegram, Google Chrome data and more

XCSSET macOS malware continues to evolve, now it is able to steal…