Role with too wide permissions Affecting Deployment service in Kubernetes


Severity

0.0
medium
0
10
Severity Framework
Snyk CCSS
Rule category
IAM/ Access Control

Is your environment affected by this misconfiguration?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
Frameworks
CIS-ControlsCSA-CCM
  • Snyk IDSNYK-CC-00643
  • creditSnyk Research Team

Description

The use of wildcard rights grants is likely to provide excessive rights to the Kubernetes API.

How to fix?

Remove any wildcards [*] from rules.verbs and rules.resources.

Example Configuration

apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
  name: allowed-role
rules:
- apiGroups: [""] 
  resources: ["pods"]
  verbs: ["get", "watch", "list"]