Voyage involves exploiting web vulnerabilities, container pivoting, and Docker escape techniques. The process includes reconnaissance with Nmap, CMS enumeration, exploiting insecure deserialization, and abusing Linux capabilities for privilege escalation. #CVE-2023-23752 #DockerEscaping
Keypoints
- Initial network reconnaissance is performed using Nmap to identify open ports and services.
- The target runs Joomla 4.2.7 with reported vulnerabilities, including access control issues.
- Insecure deserialization via Pythonβs pickle allows remote code execution (RCE), leading to container compromise.
- Docker vulnerabilities, particularly the cap_sys_module capability, can be exploited to escape containers and gain host root access.
- Privilege escalation is achieved by loading a custom kernel module and executing a reverse shell to obtain root access.
Read More: https://infosecwriteups.com/recon-728a9aad68a8?source=rssβ-7b722bfd1b8dβ4