Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-14271 PoC — Docker 代码注入漏洞

Source
Associated Vulnerability
Title:Docker 代码注入漏洞 (CVE-2019-14271)
Description:In Docker 19.03.x before 19.03.1 linked against the GNU C Library (aka glibc), code injection can occur when the nsswitch facility dynamically loads a library inside a chroot that contains the contents of the container.
Description
A convenient and time-saving auto script of building environment and exploit it.
Readme
# CVE-2019-14271_Exploit
A convenient and time-saving auto script of building environment and exploit it.

# References
https://github.com/Metarget/metarget

https://github.com/Metarget/metarget/tree/master/writeups_cnv/docker-cve-2019-14271

https://github.com/thomasyang1207/Exploits/tree/master/CVE_2019_14271

# Usage
```bash
chmod 777 Exploit.sh
chmod 777 Install_env.sh
sudo ./Install_env.sh
sudo ./Exploit.sh
```
> If the image has been built, run `Exploit.sh` only for reuse.

Now you have entered the container `cve-14271` and see:
```bash
root@d9b5a334a0e9:/# ls
bin         breakout  home     lib32   logs   opt   run   sys  var
boot        dev       host_fs  lib64   media  proc  sbin  tmp
break_logs  etc       lib      libx32  mnt    root  srv   usr
```

Enter `host_fs` and you will find the host's root directory has been mounted here and you escape successfully. You can act as a root user in the host machine.
File Snapshot

[4.0K] /data/pocs/f987a27b5ecabdd623c112f3fd3ba857f5ee42b8 ├── [4.0K] exp │   ├── [ 334] breakout │   ├── [ 298] Dockerfile │   ├── [391K] libnss_files.so.2 │   └── [ 46K] original_libnss_files.so.2 ├── [ 414] Exploit.sh ├── [ 364] Install_env.sh ├── [ 11K] LICENSE └── [ 928] README.md 1 directory, 8 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →