exploitdb
WORKING POC
by embargo · locallinux
https://www.exploit-db.com/exploits/46369
This exploit leverages CVE-2019-5736 to overwrite the host's runc binary from within a container, achieving root-level code execution on the host. It uses a malicious shared library to hijack the runc process during container execution.
Classification
Working Poc 100%
Target:
runc (Docker runtime) and LXC
No auth needed
Prerequisites:
Access to a running container with the ability to install packages (gcc, runc/lxc) · Ability to copy files into the container
exploitdb
WORKING POC
by feexd · locallinux
https://www.exploit-db.com/exploits/46359
This exploit leverages CVE-2020-15257, a container escape vulnerability in Docker and runc, by overwriting the host's `/usr/bin/docker-runc` binary with a malicious payload. It requires execution within a container and triggers when `docker exec` is used on the host.
Classification
Working Poc 90%
Target:
Docker with runc (versions before the fix for CVE-2020-15257)
No auth needed
Prerequisites:
Access to a container with Docker · Ability to execute commands within the container
nomisec
WORKING POC
655 stars
by Frichetten · local
https://github.com/Frichetten/CVE-2019-5736-PoC
This is a Go implementation of CVE-2019-5736, a container escape exploit for Docker. It overwrites the host's runc binary by leveraging a race condition when a user executes `docker exec` into a container, allowing arbitrary command execution as root on the host.
Classification
Working Poc 100%
Target:
Docker (versions 18.09.1-ce, 18.03.1-ce, and others with vulnerable runc)
No auth needed
Prerequisites:
Root access inside the container · Docker with vulnerable runc version · Ability to execute a binary inside the container
nomisec
WORKING POC
208 stars
by q3k · local
https://github.com/q3k/cve-2019-5736-poc
This PoC demonstrates CVE-2019-5736, a container escape vulnerability in runc, by appending a string to the host's runc binary via /proc/self/exe manipulation. It uses a two-stage approach to overwrite the binary during runtime.
Classification
Working Poc 95%
Target:
runc (Docker container runtime) < 1.0-rc6
No auth needed
Prerequisites:
Docker container with vulnerable runc version · Ability to execute code inside the container
nomisec
WORKING POC
85 stars
by twistlock · local
https://github.com/twistlock/RunC-CVE-2019-5736
This repository contains two proof-of-concept exploits for CVE-2019-5736, a vulnerability in runC that allows container escape via overwriting the host's runC binary. The exploits demonstrate both a simple binary overwrite and a reverse shell payload.
Classification
Working Poc 100%
Target:
runC (Docker container runtime)
No auth needed
Prerequisites:
Docker environment with vulnerable runC version · Ability to execute commands inside a container
nomisec
WORKING POC
15 stars
by jas502n · local
https://github.com/jas502n/CVE-2019-5736
This is a functional exploit for CVE-2019-5736, which leverages a container escape vulnerability in runc and LXC. The exploit overwrites the host's runc binary to achieve root-level code execution on the host system.
Classification
Working Poc 100%
Target:
runc (Docker container runtime), LXC
No auth needed
Prerequisites:
Access to a running container with the vulnerable runc or LXC version · Ability to compile code inside the container
nomisec
WORKING POC
7 stars
by agppp · poc
https://github.com/agppp/cve-2019-5736-poc
This PoC exploits CVE-2019-5736, a container escape vulnerability in runc, by overwriting the host's runc binary with a malicious payload. It uses a two-stage approach to inject a reverse shell into the host system.
Classification
Working Poc 95%
Target:
runc (Docker container runtime) < 1.0-rc6
No auth needed
Prerequisites:
Docker container with access to the host's runc binary · Ability to execute commands within the container
nomisec
WORKING POC
3 stars
by epsteina16 · poc
https://github.com/epsteina16/Docker-Escape-Miner
This repository contains a working proof-of-concept exploit for CVE-2019-5736, which leverages a Docker container escape vulnerability to overwrite the runc binary and execute a cryptocurrency miner with root privileges. The exploit combines a legitimate Docker escape technique with a Bitcoin mining script to demonstrate post-exploitation activity.
Classification
Working Poc 95%
Target:
Docker with runc version 1.0.0-rc5
No auth needed
Prerequisites:
Docker version 18.03.0 with runc version 1.0.0-rc5 · Ability to run a Docker container on the target system
nomisec
WORKING POC
1 stars
by panzouh · poc
https://github.com/panzouh/Docker-Runc-Exploit
This repository contains a Dockerfile exploit for CVE-2019-5736, a container escape vulnerability in runc. It leverages a malicious container image to overwrite the host runc binary and achieve privilege escalation.
Classification
Working Poc 90%
Target:
runc (Docker container runtime) < 1.0-rc6
No auth needed
Prerequisites:
Docker installed on the host · Ability to run a malicious container image
nomisec
WORKING POC
1 stars
by GiverOfGifts · remote
https://github.com/GiverOfGifts/CVE-2019-5736-Custom-Runtime
This repository contains a functional proof-of-concept exploit for CVE-2019-5736, targeting a container runtime vulnerability. The exploit leverages a malicious shared library to overwrite the runtime binary, achieving container escape.
Classification
Working Poc 95%
Target:
runc (container runtime)
No auth needed
Prerequisites:
Access to a vulnerable container runtime · Ability to modify shared libraries in the container
nomisec
WORKING POC
1 stars
by milloni · poc
https://github.com/milloni/cve-2019-5736-exp
This PoC exploits CVE-2019-5736, a container escape vulnerability in runc (Docker runtime) by overwriting the runc binary with a malicious payload. The exploit leverages file descriptor manipulation to achieve host-level code execution.
Classification
Working Poc 95%
Target:
runc (Docker runtime) < 1.0-rc6
No auth needed
Prerequisites:
Docker container with access to the host's runc binary · Ability to build and run a custom Docker image
nomisec
WORKING POC
1 stars
by b3d3c · poc
https://github.com/b3d3c/poc-cve-2019-5736
This PoC exploits CVE-2019-5736, a container escape vulnerability in runc, by overwriting the host's runc binary with a malicious payload. It involves compiling a trojanized libseccomp library and replacing /bin/bash to achieve privilege escalation.
Classification
Working Poc 95%
Target:
runc (Docker container runtime) < 1.0-rc6
No auth needed
Prerequisites:
Access to a Docker container with runc < 1.0-rc6 · Ability to execute commands inside the container
nomisec
WORKING POC
1 stars
by likekabin · poc
https://github.com/likekabin/CVE-2019-5736
This is a functional exploit for CVE-2019-5736, targeting a container escape vulnerability in runc and LXC. It overwrites the host's runc binary to achieve root-level code execution by leveraging a malicious shared library and init process.
Classification
Working Poc 100%
Target:
runc (< 1.0-rc6), LXC
No auth needed
Prerequisites:
Access to a running container with vulnerable runc/LXC · Ability to compile code inside the container
gitlab
WRITEUP
by sastraadiwiguna-purpleeliteteaming · poc
https://gitlab.com/sastraadiwiguna-purpleeliteteaming/holistic-deconstruction-of-cve-2019-5736
This repository provides a detailed technical analysis and deconstruction of CVE-2019-5736, a critical vulnerability in runc that allows container escape to host root. It includes a high-level explanation of the exploit chain, impact analysis, and mitigation recommendations.
Classification
Writeup 95%
Target:
runc (versions 1.0-rc1 through 1.0-rc6)
No auth needed
Prerequisites:
Vulnerable runc version · Root access within the container
nomisec
WRITEUP
by sastraadiwiguna-purpleeliteteaming · poc
https://github.com/sastraadiwiguna-purpleeliteteaming/Holistic-Deconstruction-of-CVE-2019-5736-
This repository provides a detailed deconstruction and Proof-of-Concept (PoC) for CVE-2019-5736, a critical vulnerability in runc that allows container escape to host root access. It includes technical analysis, setup instructions, and impact assessment.
Classification
Writeup 90%
Target:
runc versions 1.0-rc1 through 1.0-rc6
No auth needed
Prerequisites:
Vulnerable runc version · Root privileges within the container · Access to host filesystem via OverlayFS
nomisec
WORKING POC
by Perimora · local
https://github.com/Perimora/cve_2019-5736-PoC
This repository contains a C-based proof-of-concept exploit for CVE-2019-5736, which allows a malicious Docker container to overwrite the host's `runc` binary and execute arbitrary commands on the host with root privileges. The exploit includes scripts for environment setup, building the exploit, and triggering the vulnerability.
Classification
Working Poc 95%
Target:
Docker (runc) versions before 1.0-rc6
No auth needed
Prerequisites:
Docker installed on the host · Ability to run a Docker container
nomisec
WORKING POC
by h3x0v3rl0rd · poc
https://github.com/h3x0v3rl0rd/CVE-2019-5736
This is a working exploit for CVE-2019-5736, a container escape vulnerability in runc. It overwrites the host's runc binary via a file descriptor manipulation to achieve remote code execution (RCE) on the host system.
Classification
Working Poc 100%
Target:
runc (Docker container runtime) < 1.0-rc6
No auth needed
Prerequisites:
Access to a container running with a vulnerable version of runc · Ability to execute the exploit binary inside the container
nomisec
WRITEUP
by sonyavalo · poc
https://github.com/sonyavalo/CVE-2019-5736-Dockerattack-and-security-mechanism
This repository documents an attack implementation and security mechanism for CVE-2019-5736, a Docker vulnerability allowing container escape to gain root access. It describes the steps to exploit the vulnerability and a mitigation using the 'chattr' command to make the 'runc' file immutable.
Classification
Writeup 90%
Target:
Docker 18.03.1-ce (Runc 1.0.0-rc5)
No auth needed
Prerequisites:
Docker 18.03.1-ce with Runc 1.0.0-rc5 · Ability to run a malicious container · Network access to set up a listener
nomisec
WORKING POC
by si1ent-le · poc
https://github.com/si1ent-le/CVE-2019-5736
This repository contains a working proof-of-concept exploit for CVE-2019-5736, a container escape vulnerability in runc. The exploit involves overwriting the host's runc binary with a malicious payload to achieve remote code execution on the host system.
Classification
Working Poc 95%
Target:
runc (Docker container runtime) versions before 1.0-rc6
No auth needed
Prerequisites:
Access to a Docker container with a vulnerable version of runc · Ability to execute commands within the container
nomisec
WORKING POC
by takumak · poc
https://github.com/takumak/cve-2019-5736-reproducer
This repository provides a reproducer for CVE-2019-5736, a container escape vulnerability in runc. It includes steps to build vulnerable packages, set up a test environment, and execute the exploit to demonstrate the flaw.
Classification
Working Poc 95%
Target:
runc (versions before 1.0.0-rc6+git20181203.96ec2177)
No auth needed
Prerequisites:
Ubuntu 18.04 KVM instance · Vulnerable versions of docker.io, containerd, and runc · LXD for VM management
nomisec
WORKING POC
by fahmifj · poc
https://github.com/fahmifj/Docker-breakout-runc
This PoC exploits CVE-2019-5736, a container breakout vulnerability in runc, by overwriting the /bin/sh binary and then the runc binary itself via file descriptor manipulation. It achieves container escape by leveraging the time-of-check to time-of-use (TOCTOU) race condition in runc.
Classification
Working Poc 100%
Target:
runc (Docker container runtime) < 1.0-rc6
No auth needed
Prerequisites:
Access to a running Docker container with vulnerable runc version · Ability to execute arbitrary code within the container
nomisec
WORKING POC
by BBRathnayaka · poc
https://github.com/BBRathnayaka/POC-CVE-2019-5736
This repository contains a proof-of-concept exploit for CVE-2019-5736, a vulnerability in runC that allows container escape by overwriting the runC binary. It includes two PoCs: one that replaces runC with a benign program and another that installs a reverse shell.
Classification
Working Poc 95%
Target:
runc (Docker container runtime)
No auth needed
Prerequisites:
Access to a Docker container with runC · Ability to execute commands within the container
nomisec
WORKING POC
by Billith · local
https://github.com/Billith/CVE-2019-5736-PoC
This PoC exploits CVE-2019-5736, a container escape vulnerability in runc, by overwriting the runc binary via a race condition in /proc/self/exe. It achieves RCE on the host system when a victim executes a command in a compromised container.
Classification
Working Poc 95%
Target:
runc (Docker container runtime) < 1.0-rc6
No auth needed
Prerequisites:
Access to a container with a writable /bin/sh · Victim must execute a command in the container (e.g., `docker exec <container> sh`)
nomisec
WORKING POC
by geropl · poc
https://github.com/geropl/CVE-2019-5736
This is a functional exploit for CVE-2019-5736, which allows container escape by overwriting the host's runc binary via a malicious init process. The exploit leverages a race condition in runc to gain root-level code execution on the host.
Classification
Working Poc 100%
Target:
runc (and LXC) versions affected by CVE-2019-5736
No auth needed
Prerequisites:
Access to a container with vulnerable runc/LXC · Ability to compile and execute code within the container
nomisec
WORKING POC
by h-wookie · poc
https://github.com/h-wookie/cve-2019-5736-poc
This PoC exploits CVE-2019-5736, a container escape vulnerability in runc, by overwriting the host's runc binary with a malicious payload. It uses a two-stage approach to achieve remote code execution (RCE) on the host system.
Classification
Working Poc 95%
Target:
runc (Docker container runtime) < 1.0-rc6
No auth needed
Prerequisites:
Access to a Docker container with a vulnerable version of runc · Ability to build and run a custom Docker image
nomisec
WORKING POC
by Lee-SungYoung · poc
https://github.com/Lee-SungYoung/cve-2019-5736-study
This PoC exploits CVE-2019-5736, a container escape vulnerability in runc, by overwriting the host's runc binary with a malicious version. It uses a two-stage payload to achieve remote code execution via a reverse shell.
Classification
Working Poc 95%
Target:
runc (Docker container runtime) < 1.0-rc6
No auth needed
Prerequisites:
Access to a running Docker container · Ability to execute commands within the container
nomisec
WORKING POC
by RyanNgWH · poc
https://github.com/RyanNgWH/CVE-2019-5736-POC
This PoC exploits CVE-2019-5736, a container breakout vulnerability in runC, by overwriting the runC binary on the host system. It leverages a race condition to replace the runC binary with malicious code, potentially leading to remote code execution on the host.
Classification
Working Poc 95%
Target:
runC (Docker container runtime) < 1.0-rc6
No auth needed
Prerequisites:
Access to a Docker container with runC as the runtime · Ability to execute code within the container
nomisec
WORKING POC
by yyqs2008 · poc
https://github.com/yyqs2008/CVE-2019-5736-PoC-2
This PoC exploits CVE-2019-5736, a container escape vulnerability in runc, by overwriting the runc binary with a malicious payload that spawns a reverse shell. The exploit leverages a race condition to replace the runc binary via /proc/self/fd manipulation.
Classification
Working Poc 100%
Target:
runc (Docker container runtime) < 1.0-rc6
No auth needed
Prerequisites:
Access to a vulnerable Docker container · Ability to execute arbitrary code within the container
nomisec
WORKING POC
by likekabin · poc
https://github.com/likekabin/cve-2019-5736-poc
This PoC exploits CVE-2019-5736, a container escape vulnerability in runc, by overwriting the host runc binary with arbitrary data. It consists of two stages: stage1 opens the host binary and passes it to stage2, which appends a string to demonstrate the vulnerability.
Classification
Working Poc 95%
Target:
runc (Docker container runtime) < 1.0-rc6
No auth needed
Prerequisites:
Docker container with vulnerable runc version · Ability to execute code inside the container
vulncheck_xdb
WORKING POC
local
https://github.com/KalioNix/cve
This repository contains a functional exploit for CVE-2019-5736, a container escape vulnerability in runc. The exploit involves overwriting the host's runc binary with a malicious payload to achieve remote code execution (RCE) on the host system.
Classification
Working Poc 95%
Target:
runc (Docker container runtime) < 1.0-rc6
No auth needed
Prerequisites:
Docker environment with vulnerable runc version · Ability to execute commands inside a container
vulncheck_xdb
WORKING POC
local
https://github.com/khu-capstone-design/kubernetes-vulnerability-investigation
This repository contains a functional exploit for CVE-2019-5736, a vulnerability in runc that allows container escape to achieve RCE on the host system. The PoC includes detailed setup instructions, modified exploit code, and a demonstration of gaining root access on the host via a reverse shell.
Classification
Working Poc 95%
Target:
runc (Docker container runtime) versions before 1.0-rc6
No auth needed
Prerequisites:
Docker-ce 18.06.1~ce~3-0~ubuntu · Ubuntu 18.04 host · libseccomp-2.5.1
metasploit
WORKING POC
MANUAL
by Adam Iwaniuk, Borys Popławski, Nick Frichette, Christophe De La Fuente, Spencer McIntyre, Prepend · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/local/docker_runc_escape.rb
This Metasploit module exploits CVE-2019-5736, a flaw in `runc` that allows Docker container escape by overwriting the `runc` binary with a payload. It triggers execution when `docker exec` is used, granting root access on the host.
Classification
Working Poc 100%
Target:
Docker with runC (versions before fix)
No auth needed
Prerequisites:
Root access inside the Docker container · Writable directory in the container