@@ -13,19 +13,20 @@ class MetasploitModule < Msf::Exploit::Local
13
13
14
14
def initialize ( info = { } )
15
15
super ( update_info ( info , {
16
- 'Name' => 'Docker Daemon Privilege Escalation' ,
17
- 'Description' => %q{
16
+ 'Name' => 'Docker Daemon Privilege Escalation' ,
17
+ 'Description' => %q{
18
18
This module obtains root privileges from any host account with access to the
19
19
Docker daemon. Usually this includes accounts in the `docker` group.
20
20
} ,
21
- 'License' => MSF_LICENSE ,
22
- 'Author' => [ 'forzoni' ] ,
21
+ 'License' => MSF_LICENSE ,
22
+ 'Author' => [ 'forzoni' ] ,
23
23
'DisclosureDate' => 'Jun 28 2016' ,
24
- 'Platform' => 'linux' ,
25
- 'Arch' => [ ARCH_X86 , ARCH_X86_64 , ARCH_ARMLE , ARCH_MIPSLE , ARCH_MIPSBE ] ,
26
- 'Targets' => [ [ 'Automatic' , { } ] ] ,
24
+ 'Platform' => 'linux' ,
25
+ 'Arch' => [ ARCH_X86 , ARCH_X86_64 , ARCH_ARMLE , ARCH_MIPSLE , ARCH_MIPSBE ] ,
26
+ 'Targets' => [ [ 'Automatic' , { } ] ] ,
27
27
'DefaultOptions' => { 'PrependFork' => true , 'WfsDelay' => 60 } ,
28
- 'SessionTypes' => [ 'shell' , 'meterpreter' ]
28
+ 'SessionTypes' => [ 'shell' , 'meterpreter' ] ,
29
+ 'DefaultTarget' => 0
29
30
}
30
31
) )
31
32
register_advanced_options ( [
0 commit comments