CVE-2019-5736

HIGH EXPLOITED

Docker Container Escape Via runC Overwrite

Title source: metasploit

Description

runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.

Exploits (34)

exploitdb WORKING POC
by embargo · locallinux
https://www.exploit-db.com/exploits/46369
exploitdb WORKING POC
by feexd · locallinux
https://www.exploit-db.com/exploits/46359
nomisec WORKING POC 655 stars
by Frichetten · local
https://github.com/Frichetten/CVE-2019-5736-PoC
nomisec WORKING POC 208 stars
by q3k · local
https://github.com/q3k/cve-2019-5736-poc
nomisec WORKING POC 85 stars
by twistlock · local
https://github.com/twistlock/RunC-CVE-2019-5736
nomisec WORKING POC 15 stars
by jas502n · local
https://github.com/jas502n/CVE-2019-5736
nomisec WORKING POC 7 stars
by agppp · poc
https://github.com/agppp/cve-2019-5736-poc
nomisec WORKING POC 3 stars
by epsteina16 · poc
https://github.com/epsteina16/Docker-Escape-Miner
nomisec WORKING POC 1 stars
by panzouh · poc
https://github.com/panzouh/Docker-Runc-Exploit
nomisec WORKING POC 1 stars
by GiverOfGifts · remote
https://github.com/GiverOfGifts/CVE-2019-5736-Custom-Runtime
nomisec WORKING POC 1 stars
by milloni · poc
https://github.com/milloni/cve-2019-5736-exp
nomisec WORKING POC 1 stars
by b3d3c · poc
https://github.com/b3d3c/poc-cve-2019-5736
nomisec WORKING POC 1 stars
by likekabin · poc
https://github.com/likekabin/CVE-2019-5736
gitlab WRITEUP
by sastraadiwiguna-purpleeliteteaming · poc
https://gitlab.com/sastraadiwiguna-purpleeliteteaming/holistic-deconstruction-of-cve-2019-5736
nomisec WRITEUP
by sastraadiwiguna-purpleeliteteaming · poc
https://github.com/sastraadiwiguna-purpleeliteteaming/Holistic-Deconstruction-of-CVE-2019-5736-
nomisec WORKING POC
by Perimora · local
https://github.com/Perimora/cve_2019-5736-PoC
nomisec WORKING POC
by h3x0v3rl0rd · poc
https://github.com/h3x0v3rl0rd/CVE-2019-5736
nomisec WRITEUP
by sonyavalo · poc
https://github.com/sonyavalo/CVE-2019-5736-Dockerattack-and-security-mechanism
nomisec WORKING POC
by si1ent-le · poc
https://github.com/si1ent-le/CVE-2019-5736
nomisec WORKING POC
by takumak · poc
https://github.com/takumak/cve-2019-5736-reproducer
nomisec NO CODE
by shen54 · poc
https://github.com/shen54/IT19172088
nomisec WORKING POC
by fahmifj · poc
https://github.com/fahmifj/Docker-breakout-runc
nomisec WORKING POC
by BBRathnayaka · poc
https://github.com/BBRathnayaka/POC-CVE-2019-5736
nomisec WORKING POC
by Billith · local
https://github.com/Billith/CVE-2019-5736-PoC
nomisec WORKING POC
by geropl · poc
https://github.com/geropl/CVE-2019-5736
nomisec WORKING POC
by h-wookie · poc
https://github.com/h-wookie/cve-2019-5736-poc
nomisec WORKING POC
by Lee-SungYoung · poc
https://github.com/Lee-SungYoung/cve-2019-5736-study
nomisec WORKING POC
by RyanNgWH · poc
https://github.com/RyanNgWH/CVE-2019-5736-POC
nomisec NO CODE
by stillan00b · poc
https://github.com/stillan00b/CVE-2019-5736
nomisec WORKING POC
by yyqs2008 · poc
https://github.com/yyqs2008/CVE-2019-5736-PoC-2
nomisec WORKING POC
by likekabin · poc
https://github.com/likekabin/cve-2019-5736-poc
vulncheck_xdb WORKING POC
local
https://github.com/KalioNix/cve
vulncheck_xdb WORKING POC
local
https://github.com/khu-capstone-design/kubernetes-vulnerability-investigation
metasploit WORKING POC MANUAL
by Adam Iwaniuk, Borys Popławski, Nick Frichette, Christophe De La Fuente, Spencer McIntyre, Prepend · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/local/docker_runc_escape.rb

References (66)

... and 46 more

Scores

CVSS v3 8.6
EPSS 0.5918
EPSS Percentile 98.2%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

Details

VulnCheck KEV 2022-08-25
CWE
CWE-78
Status published
Products (32)
apache/mesos 1.4.0 - 1.4.3
canonical/ubuntu_linux 16.04
canonical/ubuntu_linux 18.04
canonical/ubuntu_linux 18.10
canonical/ubuntu_linux 19.04
d2iq/dc\/os < 1.10.10
d2iq/kubernetes_engine < 2.2.0-1.13.3
docker/docker < 18.09.2
fedoraproject/fedora 29
fedoraproject/fedora 30
... and 22 more
Published Feb 11, 2019
Tracked Since Feb 18, 2026