Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-5736

EPSS 59.18% · P98
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2019-5736

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Docker 操作系统命令注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Docker是美国Docker公司的一款开源的应用容器引擎。该产品支持在Linux系统上创建一个容器(轻量级虚拟机)并部署和运行应用程序,以及通过配置文件实现应用程序的自动化安装、部署和升级。 Docker 18.09.2之前版本和其他产品中的runc 1.0-rc6及之前版本中存在安全漏洞,该漏洞源于程序没有正确地处理文件描述符。攻击者可利用该漏洞覆盖主机runc的二进制文件并以root权限执行命令。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2019-5736

#POC DescriptionSource LinkShenlong Link
1Unweaponized Proof of Concept for CVE-2019-5736 (Docker escape)https://github.com/q3k/cve-2019-5736-pocPOC Details
2PoC for CVE-2019-5736https://github.com/Frichetten/CVE-2019-5736-PoCPOC Details
3runc容器逃逸漏洞预警https://github.com/jas502n/CVE-2019-5736POC Details
4Nonehttps://github.com/likescam/CVE-2019-5736POC Details
5Nonehttps://github.com/likescam/cve-2019-5736-pocPOC Details
6getshell testhttps://github.com/agppp/cve-2019-5736-pocPOC Details
7Nonehttps://github.com/b3d3c/poc-cve-2019-5736POC Details
8CVE-2019-5736 POCshttps://github.com/twistlock/RunC-CVE-2019-5736POC Details
9Nonehttps://github.com/yyqs2008/CVE-2019-5736-PoC-2POC Details
10https://nvd.nist.gov/vuln/detail/CVE-2019-5736 poc of CVE-2019-5736 https://github.com/zyriuse75/CVE-2019-5736-PoCPOC Details
11Nonehttps://github.com/stillan00b/CVE-2019-5736POC Details
12Exploit for the CVE-2019-5736 runc vulnerabilityhttps://github.com/milloni/cve-2019-5736-expPOC Details
13Docker runc CVE-2019-5736 exploit Dockerfile. Credits : https://github.com/Frichetten/CVE-2019-5736-PoC.githttps://github.com/panzouh/Docker-Runc-ExploitPOC Details
14Proof of concept code for breaking out of docker via runChttps://github.com/RyanNgWH/CVE-2019-5736-POCPOC Details
15Nonehttps://github.com/Lee-SungYoung/cve-2019-5736-studyPOC Details
16Nonehttps://github.com/chosam2/cve-2019-5736-pocPOC Details
17Code sample for using exploit CVE-2019-5736 to mine bitcoin with no association to original container or user.https://github.com/epsteina16/Docker-Escape-MinerPOC Details
18Nonehttps://github.com/geropl/CVE-2019-5736POC Details
19CVE-2019-5736 implemented in a self-written container runtime to understand the exploit.https://github.com/GiverOfGifts/CVE-2019-5736-Custom-RuntimePOC Details
20Nonehttps://github.com/Billith/CVE-2019-5736-PoCPOC Details
21Nonehttps://github.com/BBRathnayaka/POC-CVE-2019-5736POC Details
22CVE-2019-5736https://github.com/shen54/IT19172088POC Details
23Nonehttps://github.com/crypticdante/CVE-2019-5736POC Details
24Modified version of CVE-2019-5736-PoC by Frichettenhttps://github.com/fahmifj/Docker-breakout-runcPOC Details
25Nonehttps://github.com/Asbatel/CVE-2019-5736_POCPOC Details
26Nonehttps://github.com/takumak/cve-2019-5736-reproducerPOC Details
27Nonehttps://github.com/si1ent-le/CVE-2019-5736POC Details
28Nonehttps://github.com/H3xL00m/CVE-2019-5736POC Details
29Nonehttps://github.com/n3ov4n1sh/CVE-2019-5736POC Details
30Nonehttps://github.com/c0d3cr4f73r/CVE-2019-5736POC Details
31Nonehttps://github.com/Sp3c73rSh4d0w/CVE-2019-5736POC Details
32Nonehttps://github.com/0xwh1pl4sh/CVE-2019-5736POC Details
33Nonehttps://github.com/N3rdyN3xus/CVE-2019-5736POC Details
34Nonehttps://github.com/NyxByt3/CVE-2019-5736POC Details
35Nonehttps://github.com/likekabin/CVE-2019-5736POC Details
36Nonehttps://github.com/likekabin/cve-2019-5736-pocPOC Details
37Nonehttps://github.com/h3xcr4ck3r/CVE-2019-5736POC Details
38Nonehttps://github.com/n3rdh4x0r/CVE-2019-5736POC Details
39Description of the Project goes herehttps://github.com/sonyavalo/CVE-2019-5736-attack-and-security-mechanismPOC Details
40In this project, we found a recent attack through the malicious container and implemented a security mechanism to stop it.https://github.com/sonyavalo/CVE-2019-5736-Dockerattack-and-security-mechanismPOC Details
41Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/%E4%BA%91%E5%AE%89%E5%85%A8%E6%BC%8F%E6%B4%9E/Docker%20runC%20%E6%BC%8F%E6%B4%9E%E5%AF%BC%E8%87%B4%E5%AE%B9%E5%99%A8%E9%80%83%E9%80%B8%20CVE-2019-5736.mdPOC Details
42Nonehttps://github.com/h3x0v3rl0rd/CVE-2019-5736POC Details
43C-based PoC for CVE-2019-5736https://github.com/Perimora/cve_2019-5736-PoCPOC Details
44Nonehttps://github.com/h-wookie/cve-2019-5736-pocPOC Details
45This repository provides a high-fidelity technical deconstruction and production-ready exploitation suite for CVE-2019-5736. It demonstrates how a root user inside a container can achieve a Host Root Shell by overwriting the host runc binary using an OverlayFS mount and ld.so.preload manipulation.https://github.com/sastraadiwiguna-purpleeliteteaming/Holistic-Deconstruction-of-CVE-2019-5736-POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2019-5736

登录查看更多情报信息。

Same Patch Batch · n/a · 2019-02-11 · 31 CVEs total

CVE-2019-7722PMD 安全漏洞
CVE-2019-7748DbNinja 跨站脚本漏洞
CVE-2019-7747DbNinja 安全漏洞
CVE-2019-7738C.P.Sub 跨站请求伪造漏洞
CVE-2019-7737Verydows 跨站请求伪造漏洞
CVE-2019-6489多款Lexmark产品输入验证错误漏洞
CVE-2018-18569Dundas BI server 安全漏洞
CVE-2019-7736D-Link DIR-600M C1 授权问题漏洞
CVE-2019-7733LIVE555 Media Server 输入验证错误漏洞
CVE-2019-7732LIVE555 资源管理错误漏洞
CVE-2019-7731MyWebSQL 代码注入漏洞
CVE-2019-7730MyWebSQL 跨站请求伪造漏洞
CVE-2018-15588MailMate 输入验证错误漏洞
CVE-2018-15587GNOME Evolution 数据伪造问题漏洞
CVE-2018-15586Enigmail 数据伪造问题漏洞
CVE-2018-20772Frog CMS 代码注入漏洞
CVE-2019-6975Django 资源管理错误漏洞
CVE-2018-20587Bitcoin Core和Bitcoin Knots 访问控制错误漏洞
CVE-2019-7721nc-cms 安全漏洞
CVE-2019-7720taocms 代码注入漏洞

Showing top 20 of 31 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2019-5736

No comments yet


Leave a comment