<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Escape Docker Container Using waitid() &#124; CVE-2017-5123 &#124; Twistlock</title>
	<atom:link href="http://www.epanorama.net/blog/2018/01/05/escape-docker-container-using-waitid-cve-2017-5123-twistlock-19/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2018/01/05/escape-docker-container-using-waitid-cve-2017-5123-twistlock-19/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Sun, 12 Apr 2026 21:37:09 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/01/05/escape-docker-container-using-waitid-cve-2017-5123-twistlock-19/comment-page-1/#comment-1688921</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 24 Aug 2020 12:16:59 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=62569#comment-1688921</guid>
		<description><![CDATA[Escaping out of a docker container by circumventing an ad-hoc reverse proxy that was supposed to prevent abuse of &quot;docker.sock&quot; file exposure.

A Tale of Escaping a Hardened Docker container
https://www.redtimmy.com/docker/a-tale-of-escaping-a-hardened-docker-container/]]></description>
		<content:encoded><![CDATA[<p>Escaping out of a docker container by circumventing an ad-hoc reverse proxy that was supposed to prevent abuse of &#8220;docker.sock&#8221; file exposure.</p>
<p>A Tale of Escaping a Hardened Docker container<br />
<a href="https://www.redtimmy.com/docker/a-tale-of-escaping-a-hardened-docker-container/" rel="nofollow">https://www.redtimmy.com/docker/a-tale-of-escaping-a-hardened-docker-container/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/01/05/escape-docker-container-using-waitid-cve-2017-5123-twistlock-19/comment-page-1/#comment-1621117</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 15 Jan 2019 13:08:41 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=62569#comment-1621117</guid>
		<description><![CDATA[THREAT RESEARCH BLOG POST
How I Hacked Play-with-Docker and Remotely Ran Code on the Host
https://www.cyberark.com/threat-research-blog/how-i-hacked-play-with-docker-and-remotely-ran-code-on-the-host/

Play-with-Docker (PWD), Docker’s playground website, allows beginners to run Docker commands in a matter of seconds. Built on a number of hosts with each running multiple student’s containers, it’s a great place to learn Docker. PWD provides the experience of having a free Alpine Linux virtual machine in a web browser where students can build and run Docker containers and experience Docker firsthand without having to first install and configure it.

This unique offering was warmly welcomed by DevOps practitioners with more than 100,000 total monthly site visits, where Docker tutorials, workshops and training are also available. The initiative was an effort originated by Marcos Nils and Jonathan Leibiusky, aided by the Docker community and sponsored by Docker.

CyberArk Labs set out to try and escape the mock container in an effort to run code on the Docker host.

The impact of container escape is similar to escape from a virtual machine, as both allow access to the underlying server.]]></description>
		<content:encoded><![CDATA[<p>THREAT RESEARCH BLOG POST<br />
How I Hacked Play-with-Docker and Remotely Ran Code on the Host<br />
<a href="https://www.cyberark.com/threat-research-blog/how-i-hacked-play-with-docker-and-remotely-ran-code-on-the-host/" rel="nofollow">https://www.cyberark.com/threat-research-blog/how-i-hacked-play-with-docker-and-remotely-ran-code-on-the-host/</a></p>
<p>Play-with-Docker (PWD), Docker’s playground website, allows beginners to run Docker commands in a matter of seconds. Built on a number of hosts with each running multiple student’s containers, it’s a great place to learn Docker. PWD provides the experience of having a free Alpine Linux virtual machine in a web browser where students can build and run Docker containers and experience Docker firsthand without having to first install and configure it.</p>
<p>This unique offering was warmly welcomed by DevOps practitioners with more than 100,000 total monthly site visits, where Docker tutorials, workshops and training are also available. The initiative was an effort originated by Marcos Nils and Jonathan Leibiusky, aided by the Docker community and sponsored by Docker.</p>
<p>CyberArk Labs set out to try and escape the mock container in an effort to run code on the Docker host.</p>
<p>The impact of container escape is similar to escape from a virtual machine, as both allow access to the underlying server.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
