Skip to content

Commit 4d0643f

Browse files
committed
Add missing DefaultTarget to Docker exploit
1 parent da516cb commit 4d0643f

File tree

1 file changed

+9
-8
lines changed

1 file changed

+9
-8
lines changed

modules/exploits/linux/local/docker_daemon_privilege_escalation.rb

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -13,19 +13,20 @@ class MetasploitModule < Msf::Exploit::Local
1313

1414
def initialize(info={})
1515
super(update_info(info, {
16-
'Name' => 'Docker Daemon Privilege Escalation',
17-
'Description' => %q{
16+
'Name' => 'Docker Daemon Privilege Escalation',
17+
'Description' => %q{
1818
This module obtains root privileges from any host account with access to the
1919
Docker daemon. Usually this includes accounts in the `docker` group.
2020
},
21-
'License' => MSF_LICENSE,
22-
'Author' => ['forzoni'],
21+
'License' => MSF_LICENSE,
22+
'Author' => ['forzoni'],
2323
'DisclosureDate' => 'Jun 28 2016',
24-
'Platform' => 'linux',
25-
'Arch' => [ARCH_X86, ARCH_X86_64, ARCH_ARMLE, ARCH_MIPSLE, ARCH_MIPSBE],
26-
'Targets' => [ ['Automatic', {}] ],
24+
'Platform' => 'linux',
25+
'Arch' => [ARCH_X86, ARCH_X86_64, ARCH_ARMLE, ARCH_MIPSLE, ARCH_MIPSBE],
26+
'Targets' => [ ['Automatic', {}] ],
2727
'DefaultOptions' => { 'PrependFork' => true, 'WfsDelay' => 60 },
28-
'SessionTypes' => ['shell', 'meterpreter']
28+
'SessionTypes' => ['shell', 'meterpreter'],
29+
'DefaultTarget' => 0
2930
}
3031
))
3132
register_advanced_options([

0 commit comments

Comments
 (0)