It's not an exploit when its a documented, and warned feature that reduces your security since day 1.
"Warning: The docker group is equivalent to the root user; For details on how this impacts security in your system, see Docker Daemon Attack Surface for details."
I did acknowledge that Docker has documented that behaviour, but that doesn't change the fact that it is a insecure-design worth being aware of. Many of the 'Docker tips' blog posts that discuss that behaviour _don't_ mention the insecurity.
> In Docker’s defense, they are aware that this is a security problem, although they apparently have no intention of actually fixing it. About half way down in their security document, they do explain that the ‘docker’ group is root-equivalent and why that is dangerous.
"Warning: The docker group is equivalent to the root user; For details on how this impacts security in your system, see Docker Daemon Attack Surface for details."
FUD