⬆️ ☠️ 🔥 Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
-
Updated
Mar 12, 2024 - Go
⬆️ ☠️ 🔥 Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
CVE-2022-0847 used to achieve container escape 利用CVE-2022-0847 (Dirty Pipe) 实现容器逃逸
Scripted Linux Privilege Escalation for the CVE-2022-0847 "Dirty Pipe" vulnerability
CVE-2022-0847 (Dirty Pipe) is an arbitrary file overwrite vulnerability that allows escalation of privileges by modifying or overwriting arbitrary read-only files e.g. /etc/passwd, /etc/shadow.
PoC Container Breakout for DirtyPipe Vulnerability CVE-2022-0847
Add a description, image, and links to the dirtypipe topic page so that developers can more easily learn about it.
To associate your repository with the dirtypipe topic, visit your repo's landing page and select "manage topics."