Rancher Server Docker Exploit
Utilizing Rancher Server, an attacker can create a docker container with the ‘/’ path mounted with read/write permissions on the host server that is running the docker container. As the docker container executes command as uid 0 it is honored by the host operating system allowing the attacker to edit/create files owed by root. This […]
The post Rancher Server Docker Exploit appeared first on MondoUnix.
