-
Notifications
You must be signed in to change notification settings - Fork 14.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Container Rooting + Escape (GameOver(lay)) (CVE-2023-2640, CVE-2023-32629) #18765
Comments
I've test the exploit script provided by @g1vi on an Ubuntu Focal Fossa 20.04.6 with a 5.4.0-1018-aws kernel, independently verifying exploit-ability of CVE-2023-32629. Based on my research the exploit still needs to be tested for CVE-2023-2640. I've developed a module from the PoC. This vulnerability is somewhat unique in that a various assortment of Ubuntu and kernel version combinations are vulnerable. For example, Lunar Lobster 6.2.0 is vulnerable to both CVE's but Lunar Lobster 5.15.0 and 5.19.0 are immune from exploitation of this vulnerability. Likewise, Focal Fossa 5.4.0, the system I tested the module on is only vulnerable to CVE-2023-32629 and no other kernel versions appear vulnerable. This module ensures that the exploit only execute on a valid combination of vulnerable distro/kernel. The module is 90% finished, I tested it using a meterpreter bind shell and it runs the exact same commands as the script provided by g1vi passing the command as an argument to I've also tried running the exploit with |
Typically bind payloads are frowned on since there are so many potential issues with networking/firewalls. If you want to keep it simple, some of the other local only payloads may be better (add user, file write), or a ping payload. |
@gardnerapp there are a couple minor things I see, and I cannot comment because it is not a PR. |
Just submitted a pull request here thanks for the help! |
Summary
Brief explanation of the module.
Basic example
Writeup: https://www.crowdstrike.com/blog/crowdstrike-discovers-new-container-exploit/
PoC (untested and unevaluated): https://github.com/g1vi/CVE-2023-2640-CVE-2023-32629
Motivation
Containers suck, break out of them and pwn the host
The text was updated successfully, but these errors were encountered: