nomisec
WORKING POC
76 stars
by NitroCao · local
https://github.com/NitroCao/CVE-2024-21626
This repository provides functional exploit code for CVE-2024-21626, a container escape vulnerability in runc. It includes multiple methods to exploit the vulnerability via Docker containers and runc directly, along with detection techniques using Falco and Snyk's leaky-vessels-dynamic-detector.
Classification
Working Poc 95%
Target:
runc (versions prior to the fix)
No auth needed
Prerequisites:
Docker or runc installed · Ability to run containers or execute runc commands
nomisec
WORKING POC
14 stars
by Wall1e · local
https://github.com/Wall1e/CVE-2024-21626-POC
This repository contains a functional proof-of-concept exploit for CVE-2024-21626, a container escape vulnerability in runc. The exploit leverages the `openat2` syscall to manipulate file descriptors and achieve a reverse shell, demonstrating container breakout.
Classification
Working Poc 95%
Target:
runc (Open Container Initiative runtime)
No auth needed
Prerequisites:
Kernel with openat2 support (>= 5.6) · Ability to create and run Docker containers with custom commands and images
nomisec
WORKING POC
6 stars
by V0WKeep3r · local
https://github.com/V0WKeep3r/CVE-2024-21626-runcPOC
This repository contains a functional proof-of-concept exploit for CVE-2024-21626, a container escape vulnerability in runc. The exploit leverages an open file descriptor leak to overwrite host system files (e.g., crontab or binary files) and achieve command execution on the host.
Classification
Working Poc 95%
Target:
runc versions v1.0.0-rc93 to 1.1.11
No auth needed
Prerequisites:
Control over a container's working directory · Ability to execute commands within the container
nomisec
WORKING POC
5 stars
by cdxiaodong · local
https://github.com/cdxiaodong/CVE-2024-21626
This repository provides a functional exploit for CVE-2024-21626, leveraging leaked file descriptors in runc to escape container isolation and access host files. The PoC uses Docker containers with manipulated working directories to exploit the vulnerability.
Classification
Working Poc 95%
Target:
runc (>=v1.0.0-rc93, <=1.1.11)
No auth needed
Prerequisites:
Docker environment with vulnerable runc version · Ability to run containers with custom working directories
nomisec
WRITEUP
4 stars
by zhangguanzhang · local
https://github.com/zhangguanzhang/CVE-2024-21626
This repository provides a detailed technical writeup on exploiting CVE-2024-21626, a vulnerability in runc that allows container escape via directory traversal and file descriptor manipulation. It includes steps to reproduce the issue, kernel version checks, and verification of the exploit's impact.
Classification
Writeup 90%
Target:
runc (v1.0.0-rc93 to 1.1.11)
No auth needed
Prerequisites:
Kernel with openat2 syscall support · Access to a vulnerable runc version · Ability to execute Docker commands
nomisec
WORKING POC
3 stars
by laysakura · local
https://github.com/laysakura/CVE-2024-21626-demo
This repository demonstrates CVE-2024-21626, a vulnerability in runc (container runtime) that allows container escape to host root via path traversal in `/proc/self/fd/8`. The PoC injects an SSH key into the host's `/root/.ssh/authorized_keys` by exploiting the vulnerability during container build/run.
Classification
Working Poc 100%
Target:
runc (versions <= 1.1.10, Docker <= 20.10.25)
No auth needed
Prerequisites:
Vulnerable runc/Docker version · Ability to build/run a malicious container image
nomisec
WORKING POC
2 stars
by KubernetesBachelor · local
https://github.com/KubernetesBachelor/CVE-2024-21626
This repository provides a functional exploit for CVE-2024-21626, a vulnerability in runc (versions 1.1.0 to 1.1.11) that allows container escape to achieve root privileges on the host machine. The exploit involves manipulating file descriptors in Docker containers to overwrite host binaries and establish a reverse shell.
Classification
Working Poc 95%
Target:
runc (1.1.0 <= version <= 1.1.11)
No auth needed
Prerequisites:
Docker installed on Ubuntu 20.04 · Vulnerable runc version (1.1.0 to 1.1.11) · Network connectivity for reverse shell
nomisec
WORKING POC
2 stars
by Sk3pper · local
https://github.com/Sk3pper/CVE-2024-21626
This repository contains a functional exploit for CVE-2024-21626, leveraging Docker's improper handling of `/proc/self/fd/` paths to achieve container escape and host filesystem access. The PoC includes multiple attack vectors (e.g., `docker run` with malicious working directory, `docker exec` with symlink manipulation) and demonstrates file read/write capabilities on the host.
Classification
Working Poc 95%
Target:
Docker (versions <= 24.0.6) and runC with vulnerable kernel (openat2 syscall present)
Auth required
Prerequisites:
Docker installed with vulnerable versions · Host kernel with openat2 syscall · Privileged access to run Docker commands
nomisec
WORKING POC
2 stars
by dorser · poc
https://github.com/dorser/cve-2024-21626
This repository contains a functional PoC for CVE-2024-21626, a vulnerability in runc (<=1.1.11) where a leaked file descriptor allows container escape. It includes a Go-based vulnerable app and an eBPF gadget to detect exploitation via symlinkat syscalls.
Classification
Working Poc 90%
Target:
runc <=1.1.11
No auth needed
Prerequisites:
runc version <=1.1.11 · ability to run containers · eBPF support for gadget
nomisec
WORKING POC
1 stars
by FlojBoj · poc
https://github.com/FlojBoj/CVE-2024-21626
This repository provides functional exploit code for CVE-2024-21626, a container breakout vulnerability in runC, containerd, and Docker. The exploit leverages improper handling of working directory paths in `/proc/self/fd/` to escape container isolation and access host filesystem.
Classification
Working Poc 95%
Target:
runC (>= 1.0.0-rc93 and <= 1.1.11), containerd (>= 1.4.7 and <= 1.6.27, >= 1.7.0 and <= 1.7.12), Docker (fixed in 25.0.2)
No auth needed
Prerequisites:
Docker/containerd environment with vulnerable versions · Ability to run containers with custom working directories
nomisec
WORKING POC
1 stars
by zpxlz · local
https://github.com/zpxlz/CVE-2024-21626-POC
This repository contains a functional exploit PoC for CVE-2024-21626, leveraging a container escape vulnerability in runc to achieve remote code execution (RCE) via a reverse shell. The exploit uses a Docker container to manipulate file descriptors and execute arbitrary commands on the host system.
Classification
Working Poc 90%
Target:
runc (container runtime)
No auth needed
Prerequisites:
ability to create Docker containers with custom commands · ability to specify container images
nomisec
WRITEUP
by strikoder · poc
https://github.com/strikoder/cve-2024-21626-runc-1.1.11-escape
This repository provides a detailed technical analysis of CVE-2024-21626, a container escape vulnerability in runc due to a file descriptor leak. It includes root cause analysis, exploitation methods, and mitigation strategies.
Classification
Writeup 100%
Target:
runc ≤ 1.1.11
Auth required
Prerequisites:
Access to a vulnerable runc binary · Ability to modify OCI bundle configurations
nomisec
WORKING POC
by scherepiuk · local
https://github.com/scherepiuk/container-escape-ebpf
This repository contains a working proof-of-concept exploit for CVE-2025-31133, a container escape vulnerability in runc. The exploit leverages eBPF to manipulate the core_pattern handler, achieving privilege escalation from within a container to the host system.
Classification
Working Poc 95%
Target:
runc (versions 1.2.7 and below, 1.3.0-rc.1 through 1.3.2, 1.4.0-rc.1 and 1.4.0-rc.2)
No auth needed
Prerequisites:
Unprivileged user access to create containers with runc · Vulnerable version of runc installed on the host
nomisec
WORKING POC
by R4mbb · local
https://github.com/R4mbb/CVE-2024-21626-PoC
This repository contains a functional PoC for CVE-2024-21626, a container escape vulnerability in runc ≤1.1.11 due to improper handling of file descriptors in cgroup setup. The exploit leverages an open file descriptor to manipulate the working directory of a container, allowing access to the host filesystem.
Classification
Working Poc 95%
Target:
runc ≤1.1.11
No auth needed
Prerequisites:
Docker or runc installed · vulnerable runc version (≤1.1.11) · ability to execute runc commands
nomisec
STUB
by adaammmeeee · local
https://github.com/adaammmeeee/little-joke
The repository contains two bash scripts that do not demonstrate any exploit for CVE-2024-21626. Instead, they display humorous messages and modify the terminal prompt, serving as a placeholder or joke rather than a functional PoC.
Target:
runc (unspecified version)
No auth needed
Prerequisites:
None
nomisec
WORKING POC
by Sk3pper · local
https://github.com/Sk3pper/CVE-2024-21626-old-docker-versions
This repository contains a functional exploit for CVE-2024-21626, demonstrating a container escape vulnerability in older Docker versions due to file descriptor (fd) leakage. The provided script `checkVulnerability.sh` iterates through potential file descriptors to identify and exploit the vulnerability, allowing access to the host filesystem.
Classification
Working Poc 95%
Target:
Docker (versions 17.03.1-ce to 17.09.1-ce with docker-runc)
No auth needed
Prerequisites:
Older Docker versions with vulnerable docker-runc components · Access to execute Docker commands
nomisec
WORKING POC
by abian2 · poc
https://github.com/abian2/CVE-2024-21626
This Dockerfile exploits CVE-2024-21626 by leveraging a container escape vulnerability to read the host's /etc/passwd file. The exploit uses a path traversal technique via /proc/self/fd/8 to access the host filesystem.
Classification
Working Poc 90%
Target:
Docker (specific version affected by CVE-2024-21626)
No auth needed
Prerequisites:
Docker environment with vulnerable configuration · Ability to run containers with specific privileges
nomisec
WORKING POC
by skysbsb · poc
https://github.com/skysbsb/CVE-2024-21626-POC
This repository contains a functional exploit for CVE-2024-21626, leveraging a container escape vulnerability in runc. The PoC uses a Docker container to overwrite /bin/bash with a malicious script that establishes a reverse shell.
Classification
Working Poc 90%
Target:
runc (container runtime)
No auth needed
Prerequisites:
ability to create Docker containers · ability to specify container images and commands
metasploit
WORKING POC
EXCELLENT
by h00die, SickMcNugget, jheysel-r7, Rory McNamara · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/local/runc_cwd_priv_esc.rb
This Metasploit module exploits CVE-2024-21626, a file descriptor leak in runc (used by Docker and Kubernetes) to achieve privilege escalation by mounting the host filesystem with root permissions. It includes checks for vulnerable versions and automates the exploitation process.
Classification
Working Poc 100%
Target:
runc <=1.1.11 (Docker, Kubernetes)
No auth needed
Prerequisites:
Docker and runc installed · Access to a writable directory · File descriptor leak (typically 7, 8, or 9)