• XSS.stack #1 – первый литературный журнал от юзеров форума

I need help with an issue regarding the exploitation of CVE-2025-55182.

Spider777

RAID-массив
Пользователь
Регистрация
27.09.2025
Сообщения
55
Реакции
0
I used a graphical batch vulnerability scanner and found many websites with this vulnerability (CVE-2025-55182), but they all seem to be static websites or containerized websites (Docker, Kubernetes). What should I do next? Or how can I escape the container and gain root privileges? Would that be too complicated?
1766394352460.png
 
If Docker works with root("id" command to check), you cannot use simple bash scripts since Docker blocks outbound connections and sockets. But you can read and write system files, configs, etc. Check for ssh daemon(it is mostly used) and add your own ssh public key to file authorized_keys. is mostly in the ~/. ssh/ directory, or you can find it on your system with the "locate" command. By adding your public key to the file of authorized keys, you can now obtain an SSH connection with a root privileged host.
 
Последнее редактирование:
If Docker works with root("id" command to check), you cannot use simple bash scripts since Docker blocks outbound connections and sockets. But you can read and write system files, configs, etc. Check for ssh daemon(it is mostly used) and add your own ssh public key to file authorized_keys. is mostly in the ~/. ssh/ directory, or you can find it on your system with the "locate" command. By adding your public key to the file of authorized keys, you can now obtain an SSH connection with a root privileged host.
I do not have root privileges.😭
 


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх