On 1/21/23 12:42, L L wrote:
> The banner at the top of https://wiki.debian.org/Docker
> <https://wiki.debian.org/Docker> says:
>
> "The Docker daemon has setUID root, and by design allows easy access as root 
> to
> the host filesystem. This makes it trivial for a malicious user to read and
> alter sensitive system files, or for a careless user to allow a malicious
> containerized app to do so. Access to Docker commands effectively grants full
> root power."
>
> I'm trying to test this. I put my own user account in the docker group (and 
> can
> execute docker commands with it).
>
> Then I tried to see if I can use Docker to write a file to a root-owned
> directory without using sudo or su. I used these commands:
> docker run debian -dit /bin/bash        #start a container
> docker cp /home/me/some-file container-id:/some-file    #put a file into the
> container
> docker cp container-id:/some-file /etc/some-file        #copy the file from 
> the
> container into somewhere I shouldn't be able to write to
>
> I got:
> open /etc/some-file: permission denied
>
> Is the wiki out of date and it's completely safe to have user accounts in the
> docker group?
> Is the wiki correct but I'm exploiting group membership wrong?

I would try something like

   docker run -v /:/host -it debian

Which I expect would give you root access to the "host" system inside
the container, under /host.

Reply via email to