How Abusing Docker API Led to Remote Code Execution, Same Origin Bypass & more

w7tAfIlMIa0/default.jpg

Well, that Escalated Quickly! How Abusing Docker API Led to Remote Code Execution, Same Origin Bypass and Persistence in the Hypervisor via Shadow Containers

With over 5 billion pulls from the Docker Hub, Docker is proving to be the most dominant technology in an exploding trend of containerization. An increasing number of production applications are now running inside containers; and to get to production, developers first use containers on their own machines.

By Michael Cherny & Sagie Dulce

Full Abstract & Presentation Materials:
https://www.blackhat.com/us-17/briefi...



w7tAfIlMIa0/default.jpg
How Abusing Docker API Led to Remote Code Execution, Same Origin Bypass & more How Abusing Docker API Led to Remote Code Execution, Same Origin Bypass & more Reviewed by Anonymous on January 15, 2018 Rating: 5