Edit HOST inside payload.c, compile with make. Start nc and run pwn.sh inside the container.
This exploit is destructive: it'll overwrite /usr/bin/docker-runc binary on the host with the
payload. It'll also overwrite /bin/sh inside the container.
Tested only on Debian 9.
No attempts were made to make it stable or reliable, it's only tested to work when a docker exec <id> /bin/sh is issued on the host.
The original commit I used to write the exploit is here.
The researchers who actually found the vulnerability have published a writeup
here.
I've added the original exploit CVE_2019_5736_tar_xz which works differently than mine. Thanks to
cyphar for pointing me to it.