Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

A potential risk in Kuadrant that could lead to takeover of the cluster #962

Closed
HouqiyuA opened this issue Oct 27, 2024 · 1 comment
Closed

Comments

@HouqiyuA
Copy link

Dear Team Members:

Greetings! Our team is very interested in your project and we recently identified a potential RBAC security risk while doing a security assessment of your project. Therefore, we would like to report it to you and provide you with the relevant details so that you can fix and improve it accordingly.

Details:

In this Kubernetes project, there is a ClusterRole named ’ manager-role‘ that has high-risk privileges to list, get, and watch on secrets resources. (https://github.com/Kuadrant/kuadrant-operator/blob/main/config/rbac/role.yaml). This ClusterRole has the privilege to directly list the secrets of the entire cluster. If an attacker steals a service account with this privilege, he can elevate the privilege and further take over the entire cluster.

Please confirm the purpose of the assignment of this permission and consider using a more granular permission non-assignment rule.
Best wishes.

HouqiyuA

@maleck13
Copy link
Collaborator

maleck13 commented Nov 4, 2024

Thanks for raising this, it was the case that Kuadrant Operator would read secrets for enforcing TLSPolicy. I believe this may have changed now. We will review the permissions

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
Status: Done
Development

No branches or pull requests

2 participants