Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2024-21626

Description

runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc 1.1.11 and earlier, due to an internal file descriptor leak, an attacker could cause a newly-spawned container process (from runc exec) to have a working directory in the host filesystem namespace, allowing for a container escape by giving access to the host filesystem ("attack 2"). The same attack could be used by a malicious image to allow a container process to gain access to the host filesystem through runc run ("attack 1"). Variants of attacks 1 and 2 could be also be used to overwrite semi-arbitrary host binaries, allowing for complete container escapes ("attack 3a" and "attack 3b"). runc 1.1.12 includes patches for this issue.

POC

Reference

- http://packetstormsecurity.com/files/176993/runc-1.1.11-File-Descriptor-Leak-Privilege-Escalation.html

- https://www.vicarius.io/vsociety/posts/leaky-vessels-part-1-cve-2024-21626

Github

- https://github.com/11notes/docker-github-runner

- https://github.com/20142995/sectool

- https://github.com/8-cm/kube-dump

- https://github.com/AMH-glitch/CHWA-LB-IDSDATASET

- https://github.com/DrAmmarMoustafa/CHASE-LB-Container-Dataset

- https://github.com/DrAmmarMoustafa/CHASE-LB-Container-IDS-Dataset

- https://github.com/EGI-Federation/SVG-advisories

- https://github.com/FishAnonymous/CAShift-Record

- https://github.com/FlojBoj/CVE-2024-21626

- https://github.com/GhostTroops/TOP

- https://github.com/KubernetesBachelor/CVE-2024-21626

- https://github.com/Maissacrement/cyber_sec_master_spv

- https://github.com/Metarget/metarget

- https://github.com/NitroCao/CVE-2024-21626

- https://github.com/PuddinCat/GithubRepoSpider

- https://github.com/R3DRUN3/R3DRUN3

- https://github.com/R4mbb/CVE-2024-21626

- https://github.com/R4mbb/CVE-2024-21626-PoC

- https://github.com/Sk3pper/CVE-2024-21626

- https://github.com/Sk3pper/CVE-2024-21626-old-docker-versions

- https://github.com/SrcVme50/Runner

- https://github.com/Threekiii/CVE

- https://github.com/V0WKeep3r/CVE-2024-21626-runcPOC

- https://github.com/Wall1e/CVE-2024-21626-POC

- https://github.com/abian2/CVE-2024-21626

- https://github.com/adaammmeeee/little-joke

- https://github.com/alban/runc-vuln-detector

- https://github.com/alban/runc-vuln-gadget

- https://github.com/aneasystone/github-trending

- https://github.com/anik-chy/Final-project-6130

- https://github.com/bfengj/Cloud-Security

- https://github.com/cdxiaodong/CVE-2024-21626

- https://github.com/chrisregy23/A-Comprehensive-Approach-to-Container-Security

- https://github.com/chrisregy23/Container-Security

- https://github.com/dorser/cve-2024-21626

- https://github.com/ecomtech-oss/pisc

- https://github.com/fireinrain/github-trending

- https://github.com/fkie-cad/nvd-json-data-feeds

- https://github.com/jafshare/GithubTrending

- https://github.com/jiayy/android_vuln_poc-exp

- https://github.com/k8sstormcenter/honeycluster

- https://github.com/laysakura/CVE-2024-21626-demo

- https://github.com/laysakura/resume-jp

- https://github.com/mightysai1997/leaky-vessels-dynamic-detector

- https://github.com/mmedhat1910/masters-testing-apps

- https://github.com/nclsbayona/leaky-vessels

- https://github.com/nomi-sec/PoC-in-GitHub

- https://github.com/opencontainers-sec/go-containersec

- https://github.com/rpinuaga/atomic-container

- https://github.com/samokat-oss/pisc

- https://github.com/securitycipher/daily-bugbounty-writeups

- https://github.com/snyk/leaky-vessels-dynamic-detector

- https://github.com/snyk/leaky-vessels-static-detector

- https://github.com/ssst0n3/c-listener

- https://github.com/ssst0n3/fd-listener

- https://github.com/tanjiti/sec_profile

- https://github.com/tarihub/offlinepost

- https://github.com/zhangguanzhang/CVE-2024-21626

- https://github.com/zhanpengliu-tencent/medium-cve

- https://github.com/zhaoolee/garss

- https://github.com/zpxlz/CVE-2024-21626-POC

- https://github.com/zulloper/cve-poc