Exploiting the Docker daemon from an XSS perspective

While reporting exposed docker daemons during an internal pentest, a colleague came up with a weird idea : is it possible to hit the Docker API from an XSS ?

Last updated